Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
News
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/3c/7b/58/3c7b5880-42fb-b38d-79e6-4c373bc353cf/mza_18180690797622887056.jpg/600x600bb.jpg
HEAL Security - Cybersecurity Intelligence & News for Healthcare
Cyber Security News - HEAL Security
433 episodes
16 hours ago
In this episode, Edd Hall discusses how cybercriminals are blending AI abuse, cloud exploitation, and social engineering to launch increasingly sophisticated attacks. From Microsoft uncovering the SesameOp backdoor that used OpenAI’s API for covert communication, to the TruffleNet campaign stealing AWS credentials, this week reveals how trusted technologies are being weaponized. Edd also breaks down new CISA advisories on industrial control systems, the U.S. CFPB’s declining cybersecurity posture, a React Native supply-chain flaw, a massive Swedish data breach affecting 1.5 million people, and a ransomware group spreading fake Microsoft Teams ads. Tune in to learn how these events highlight the growing need for vigilance, patching, and smarter cloud identity protection in today’s cyber landscape.
Show more...
Technology
RSS
All content for HEAL Security - Cybersecurity Intelligence & News for Healthcare is the property of Cyber Security News - HEAL Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode, Edd Hall discusses how cybercriminals are blending AI abuse, cloud exploitation, and social engineering to launch increasingly sophisticated attacks. From Microsoft uncovering the SesameOp backdoor that used OpenAI’s API for covert communication, to the TruffleNet campaign stealing AWS credentials, this week reveals how trusted technologies are being weaponized. Edd also breaks down new CISA advisories on industrial control systems, the U.S. CFPB’s declining cybersecurity posture, a React Native supply-chain flaw, a massive Swedish data breach affecting 1.5 million people, and a ransomware group spreading fake Microsoft Teams ads. Tune in to learn how these events highlight the growing need for vigilance, patching, and smarter cloud identity protection in today’s cyber landscape.
Show more...
Technology
https://i1.sndcdn.com/artworks-EctdqbmqPgXbE5Lu-VR2NVA-t3000x3000.png
Cisco Rootkit Exploits, Adobe Zero-Day Attacks, and Integris Health Settlement
HEAL Security - Cybersecurity Intelligence & News for Healthcare
4 minutes 35 seconds
2 weeks ago
Cisco Rootkit Exploits, Adobe Zero-Day Attacks, and Integris Health Settlement
In this episode, Edd Hall discusses the latest cybersecurity developments, including hackers deploying Linux rootkits on Cisco routers, the U.S. Senate’s scrutiny of Cisco’s security practices, and active exploits targeting Adobe Experience Manager and Windows BitLocker. He also covers Integris Health’s $30 million data breach settlement, new additions to CISA’s Known Exploited Vulnerabilities catalog, and the often-overlooked hidden costs of penetration testing — highlighting how these events shape today’s digital risk landscape.
HEAL Security - Cybersecurity Intelligence & News for Healthcare
In this episode, Edd Hall discusses how cybercriminals are blending AI abuse, cloud exploitation, and social engineering to launch increasingly sophisticated attacks. From Microsoft uncovering the SesameOp backdoor that used OpenAI’s API for covert communication, to the TruffleNet campaign stealing AWS credentials, this week reveals how trusted technologies are being weaponized. Edd also breaks down new CISA advisories on industrial control systems, the U.S. CFPB’s declining cybersecurity posture, a React Native supply-chain flaw, a massive Swedish data breach affecting 1.5 million people, and a ransomware group spreading fake Microsoft Teams ads. Tune in to learn how these events highlight the growing need for vigilance, patching, and smarter cloud identity protection in today’s cyber landscape.