Podcasts
Linux Backdoor Infection Scare, Massive Social Security Number Heist
Tom Eston | | backdoor, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, government, Government Contractor, Hacking, Information Security, Infosec, Linux, open source, pii, Podcast, Podcasts, Privacy, security, sensitive data, Social Security Numbers, technology, Weekly Edition, XZ Utils
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
Ransomware-Proof Your Data Backups with Immutability
TechSpective Podcast Episode 130 Backing up data has been a fundamental requirement for IT since data began. In the age of ransomware, though, data backups have had a bit of a ...
BTS #27 – Governance, Compliance, and The Digital Supply Chain – Josh Marpet
Show Notes The post BTS #27 - Governance, Compliance, and The Digital Supply Chain - Josh Marpet appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...
Massive AT&T Data Leak, The Danger of Thread Hijacking
Tom Eston | | ATT, Cyber Security, Cybersecurity, Data breach, Data leak, Data Privacy, Digital Privacy, email, Episodes, Information Security, Infosec, Phishing, Podcast, Podcasts, Privacy, Scams, security, social engineering, Solar Eclipse, technology, Thread Hijacking, Weekly Edition
Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist. Co-host Scott Wright joins the discussion, highlighting how millions ...
New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues
Tom Eston | | Anonymous, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Dormakaba, employee, Employer, Episodes, Fishbowl, Former Employer, Glassdoor, Information Security, Infosec, legacy systems, locks, Physical Security, Podcast, Podcasts, Privacy, Saflok, security, technology, Unsaflok, Weekly Edition
In episode 323, the hosts discuss two prominent topics. The first segment discusses a significant vulnerability discovered in hotel locks, branded as ‘Unsaflok,’ affecting 3 million doors across 131 countries. The vulnerability ...
BTS #26 – What We Don’t Know Will Hurt Us – Cheryl Biswas
Cheryl is super passionate about supply chain security and visibility. Tune in to our discussion on how we can collectively get better at reducing the attack surface and working to fix the ...
Alyssa Miller: Charting the Course Through InfoSec and Aviation
Tom Eston | | Alyssa Miller, aviation, Business, career, CISO, Cloud, Cloud Security, conference, Cyber Security, Cybersecurity, Cybersecurity Industry, Data Privacy, Digital Privacy, Episodes, hacker, HR, Information Security, Infosec, jobs, Pilot, Podcast, Podcasts, Privacy, recruiting, security, technology, Weekly Edition
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
Tom Eston | | Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Federal Privacy Law, Information Security, Infosec, insurance, Insurance Companies, messaging, phone numbers, Podcast, Podcasts, Privacy, secure messaging, security, signal, surveillance, technology, TikTok, TikTok Ban, tracking, US government, usernames, Weekly Edition
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
BTS #25 – Supply Chain Threats and Regulations
Paul and Allan will talk a little bit about Allan’s background and current work at Eclypsium. Next, we’ll cover some of the recent news and topics we’ve been discussing on our blog ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
Tom Eston | | account hacking, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, google, hacked, Hacking, Information Security, Infosec, Instagram, Malware, Meeting Invite, Meta, Microsoft Teams, online, Podcast, Podcasts, Privacy, rat, RATs, remote-access Trojan, security, social media, Spoofed Online Meetings, spoofing, Teams, technology, Weekly Edition, Zoom
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...