Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/03/fe/d0/03fed0cd-0a38-c9eb-bdc6-41f1cc9a1f27/mza_14936740212252581849.jpg/600x600bb.jpg
YusufOnSecurity.com
YusufOnSecurity.Com
245 episodes
1 week ago
Enjoying the content? Let us know your feedback! This week, we've got three stories that really caught my attention, and honestly, they're all pretty alarming in their own ways. If you're new here, welcome to the show where we break down the latest cybersecurity news and help you understand what's really happening in the cyber security domains. We're going to talk about a shocking discovery about AI security - turns out it takes way fewer malicious documents than anyone thought to compl...
Show more...
Technology
RSS
All content for YusufOnSecurity.com is the property of YusufOnSecurity.Com and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Enjoying the content? Let us know your feedback! This week, we've got three stories that really caught my attention, and honestly, they're all pretty alarming in their own ways. If you're new here, welcome to the show where we break down the latest cybersecurity news and help you understand what's really happening in the cyber security domains. We're going to talk about a shocking discovery about AI security - turns out it takes way fewer malicious documents than anyone thought to compl...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/03/fe/d0/03fed0cd-0a38-c9eb-bdc6-41f1cc9a1f27/mza_14936740212252581849.jpg/600x600bb.jpg
226 - Inside A Stealthy Malware Powering Modern Cyber Attacks
YusufOnSecurity.com
47 minutes
5 months ago
226 - Inside A Stealthy Malware Powering Modern Cyber Attacks
Enjoying the content? Let us know your feedback! In this week's episode, we get into some detailed exploration of an up and coming malware. Looking at it closer, it is one of the most advanced post-exploitation code families shaping the cybersecurity landscape in 2025. Over the time we have together, we’ll unravel what this malware is, how it works, why it’s so dangerous, and most importantly what businesses can do to defend themselves. Along the way, we’ll break down technical terms an...
YusufOnSecurity.com
Enjoying the content? Let us know your feedback! This week, we've got three stories that really caught my attention, and honestly, they're all pretty alarming in their own ways. If you're new here, welcome to the show where we break down the latest cybersecurity news and help you understand what's really happening in the cyber security domains. We're going to talk about a shocking discovery about AI security - turns out it takes way fewer malicious documents than anyone thought to compl...