Approaches to Efficient Multi-layered DDoS Protection

The landscape of DDoS attacks is constantly evolving. Gone are the days of simple bandwidth floods. Today’s attackers employ sophisticated tactics, making DDoS protection a complex yet crucial undertaking.   In my previous ...
Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO

Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO

 There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and ...

A Guide to Building Modern Approaches to DDoS Protection

The digital world thrives on constant connectivity, making websites and online services the cornerstones of countless businesses. But these crucial platforms are constantly under siege by malicious actors. Distributed denial of service ...
Critical SSH Vulnerability! PLUS: Facial Recognition Flaws & How to Dispose Old Devices Safely

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices

In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police ...
Protecting People, Not Just Data

Protecting People, Not Just Data

As I sit here, reflecting on the recent news of the ransomware attack on pathology lab Synnovis, I can’t help but feel a sense of unease wash over me. It’s not just ...

Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the highly sophisticated Russian adversary Sandworm during various destructive activities against targets in Ukraine and other countries in the ...
Kaspersky Antivirus Banned by Biden Administration!😱

The U.S. Bans Kaspersky Antivirus, WordPress Plugin Supply Chain Attacks

In episode 336 of the Shared Security Podcast, we discuss the Biden administration’s recent ban on Kaspersky antivirus software in the U.S. due to security concerns linked to its Russian origins. We ...

Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX

In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe ...
Social Media Warning Labels: A Wise Move or Government Overreach?

Social Media Warning Labels, Should You Store Passwords in Your Web Browser?

In this episode of the Shared Security Podcast, the team debates the Surgeon General’s recent call for social media warning labels and explores the pros and cons. Scott discusses whether passwords should ...

Emulating the Notorious Chinese State-Sponsored Winnti Group

AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the stealthy and notorious Winnti Group during its activities in ...