Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/3b/a5/b5/3ba5b58e-60ef-844f-4b6e-aad797ec1e78/mza_1684777110046746182.jpg/600x600bb.jpg
Prabh Nair
Prabh Nair
57 episodes
5 days ago
Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou
Show more...
Technology
RSS
All content for Prabh Nair is the property of Prabh Nair and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou
Show more...
Technology
Episodes (20/57)
Prabh Nair
Practical Threat Modeling Master Class: STRIDE-Powered

Ready to build cloud applications that attackers can’t break? In this in-depth podcast, cybersecurity host Prabh Nair sits down with his brother Pushpinder Singh—Cloud Security Architect, CCSP, AWS-Pro, Zero-Trust specialist—to unpack practical, real-world threat modeling. You’ll learn how to weave security into every sprint, cut through compliance noise, and ship code that’s resilient from day one.Pushpinder starts by breaking down STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), then shows how to map trust boundaries, data-flow diagrams (DFDs) and risk scores to the cloud stack—web front end, APIs, micro-services, payment gateways and AI workloads. Hear war-stories on adding multi-factor authentication, mutual TLS, input validation, encryption at rest/in transit and why early stakeholder buy-in crushes later rework.We dive into:Threat modeling vs secure design reviews—why both matter in DevSecOpsAdapting STRIDE, PASTA, DREAD, MAESTRO to SaaS, serverless and AI systemsBuilding living threat-model docs: scope, data flows, risk registers, Jira ticketsReal e-commerce demo: from login spoofing to tampering mitigation with signed tokensTrust-boundary pitfalls in hybrid / multi-cloud and how to segment for Zero TrustRapid response case study: choosing controls for payment and PII flows without killing agilitySneak peek at Pushpinder’s open-source threat-modeling tool (OWASP ASVS + SAM today, NIST soon)CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStick around for next steps: a live, hands-on STRIDE workshop and downloadable templates so you can start threat modeling your own projects tomorrow.#ThreatModeling #CloudSecurity #STRIDE #SecureSDLC #DevSecOps #ZeroTrust #Cybersecurity #SecurityArchitecture

Show more...
1 month ago
1 hour 31 minutes 6 seconds

Prabh Nair
Practical Threat Modeling Master Class: STRIDE-Powered

Ready to build cloud applications that attackers can’t break? In this in-depth podcast, cybersecurity host Prabh Nair sits down with his brother Pushpinder Singh—Cloud Security Architect, CCSP, AWS-Pro, Zero-Trust specialist—to unpack practical, real-world threat modeling. You’ll learn how to weave security into every sprint, cut through compliance noise, and ship code that’s resilient from day one.Pushpinder starts by breaking down STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), then shows how to map trust boundaries, data-flow diagrams (DFDs) and risk scores to the cloud stack—web front end, APIs, micro-services, payment gateways and AI workloads. Hear war-stories on adding multi-factor authentication, mutual TLS, input validation, encryption at rest/in transit and why early stakeholder buy-in crushes later rework.We dive into:Threat modeling vs secure design reviews—why both matter in DevSecOpsAdapting STRIDE, PASTA, DREAD, MAESTRO to SaaS, serverless and AI systemsBuilding living threat-model docs: scope, data flows, risk registers, Jira ticketsReal e-commerce demo: from login spoofing to tampering mitigation with signed tokensTrust-boundary pitfalls in hybrid / multi-cloud and how to segment for Zero TrustRapid response case study: choosing controls for payment and PII flows without killing agilitySneak peek at Pushpinder’s open-source threat-modeling tool (OWASP ASVS + SAM today, NIST soon)CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStick around for next steps: a live, hands-on STRIDE workshop and downloadable templates so you can start threat modeling your own projects tomorrow.#ThreatModeling #CloudSecurity #STRIDE #SecureSDLC #DevSecOps #ZeroTrust #Cybersecurity #SecurityArchitecture

Show more...
1 month ago
1 hour 31 minutes 6 seconds

Prabh Nair
CISO's Guide to Effective Communication and Boardroom Wins

Inside the CISO playbook: communication, risk, crisis leadership, and boardroom strategy. In this episode, Prabh Nair and Sunil break down what a modern CISO actually does day to day, how to balance security with business, and how to turn chaos into clear decisions. We cover threat modeling, choosing frameworks, vulnerability prioritization with weighted context, building incident playbooks, RACI for accountability, reporting lines that work, and how to run board meetings that drive funding and trust. If you are aiming for CISO, supporting one, or interviewing for senior security roles, this is a practical masterclass.00:00 – 00:37 – Introduction and Guest Welcome00:37 – 02:50 – Experience of Sunil Varkey and his humanity02:50 - 05:31 - Origin story of Sunil Varkey05:31 – 07:32 - Role of CISO07:32 – 10:23 - How do you decide whether it goes to the board or just an email update when there is any brand new risk pop up10:23 – 14:28 - Handled crises Situation14:28 – 16:24 - Recall tough time - how do you frame the decision to business leaders still trusted you?16:24 – 21:35 - Any Use case21:35 – 30:47 - What does a single metrics help you to turn those boxes into real action30:47 – 34:36 - Three actions to prove truly to own the cyber risk34:36 – 39:10 - Reporting structure39:10 – 42:49 - Playbook for earning trust and Communication Matrix42:49 – 46:10 - Persistent myth about cyber budget46:10 – 56:10 - Good cyber reporting look like with example56:11 – 01:00:40 - Important things learned from this Podcast01:00:40 – 01:01:30 - Vote of ThanksWhat you will learn:CISO role, scope, and reporting models across industriesHow to brief executives with 5 key questions and clear metricsBuilding 15 incident playbooks and who to notify when things breakAsset visibility, configs, and vulnerability context that actually reduce riskRisk acceptance workflow with documented approvalsBudgeting for fundamentals and cutting tool overlapThreat modeling beyond initial architecture and WAF effectivenessHow to earn trust, manage politics, and run concise board reportsWho this is for:CISOs, Deputy CISOs, Heads of Security, aspiring leaders, security architects, and SOC managers who need practical leadership tactics, not theory.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Prabhstudy

Show more...
2 months ago
1 hour 2 minutes 10 seconds

Prabh Nair
Ransomware Evolution & Cyber Defense Strategies by Shivendra

In this deep-dive video, cybersecurity experts Shivendra and Prabh unravel the evolution of ransomware and reveal cutting-edge tactics for detecting, preventing, and responding to cyber attacks. Discover how ransomware has transformed over the years—from early malware infections to sophisticated, targeted assaults that threaten organizations and individuals alike.Key Discussion Points:Ransomware Evolution & Targeting Strategies:Understand how ransomware has shifted from random attacks to a highly targeted approach. Learn about notorious families like Logbit, Ryuk, Conti, and Black Cat, and explore how attackers exploit vulnerabilities and weak credentials during each phase of their operation.Attack Techniques & Prevention Methods:Get a breakdown of the techniques used by cybercriminals—from phishing emails and QR code scams to exploiting vulnerabilities like EternalBlue. Learn the importance of using tools such as Cobalt Strike and Mimikatz for post-exploitation, and why a deep understanding of these methods is essential for prevention.Proactive Cyber Defenses:Discover essential proactive defense strategies including endpoint security, next-generation antivirus (NGAV) tools, and regular patching. We discuss why employee training, regular system updates, and incident response planning are critical components in defending against ransomware.Detection & Monitoring:Dive into how organizations can detect ransomware attacks early by monitoring unusual network traffic, file renaming activities, and command-line executions. Learn about the role of Endpoint Detection and Response (EDR) tools in keeping your digital infrastructure secure.Backup Strategies & Incident Response:Learn the best practices for ransomware recovery, including the 3-2-1 backup strategy. Understand the importance of regular testing of backups, and discover how tabletop exercises and a robust incident response plan can help mitigate the impact of an attack.Advanced Negotiation & Communication Techniques:Explore the tactics used by the Black Cat ransomware group, including double encryption and negotiation strategies. Learn why negotiations should be handled by senior leadership and legal teams, not just technical staff, and the importance of secure, Tor-based communication methods.Next Steps & Call-to-Action:Subscribe & Engage:If you find these insights valuable, please hit the subscribe button and click the bell icon to receive notifications on future videos covering the latest in cybersecurity and ransomware trends.Feedback & Future Content:Leave a comment below if you’d like to see more expert discussions with Shivendra, or if there’s a particular cybersecurity topic you want us to explore.Actionable Steps for Organizations:Implement the 3-2-1 backup strategy.Conduct regular tabletop exercises.Educate employees on cybersecurity best practices and phishing awareness.Invest in proactive defenses like endpoint security and NGAV tools.Linkedin Profilehttps://www.linkedin.com/in/shivendra-kumar-singh-01/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
1 hour 34 minutes 18 seconds

Prabh Nair
Rahul EXPOSES Cyber and IT Audit Secrets You Won't Believe! Part 2

IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.Rahul Sirhttps://www.linkedin.com/in/rahulkokcha/🔑 What You'll Learn:What is an IT Audit? – Understanding its purpose, scope, and importance.Principles of IT Auditing – Learn the foundational concepts that govern audits.End-to-End Audit Process – Explore the entire lifecycle of an IT audit, from planning to reporting.Cybersecurity and Security Audits – How IT audits intersect with cybersecurity and why they are crucial.Insights from Rahul Sir – Real-world experiences, challenges, and best practices in IT and cyber audits.🎯 Why Watch This Podcast?Actionable Insights: Get a clear understanding of how audits work in the IT and cybersecurity domains.Expert Guidance: Rahul Sir shares hands-on experiences and valuable tips.Career Growth: Learn how IT audits are conducted and how they align with broader security frameworks.Whether you're an aspiring IT auditor, a cybersecurity professional, or a business leader, this podcast is your gateway to mastering the principles of IT and cybersecurity audits.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Instagtramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
41 minutes 24 seconds

Prabh Nair
Rahul EXPOSES Cyber and IT Audit Secrets You Won't Believe! Part 1

IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.Rahul Sirhttps://www.linkedin.com/in/rahulkokcha/🔑 What You'll Learn:What is an IT Audit? – Understanding its purpose, scope, and importance.Principles of IT Auditing – Learn the foundational concepts that govern audits.End-to-End Audit Process – Explore the entire lifecycle of an IT audit, from planning to reporting.Cybersecurity and Security Audits – How IT audits intersect with cybersecurity and why they are crucial.Insights from Rahul Sir – Real-world experiences, challenges, and best practices in IT and cyber audits.🎯 Why Watch This Podcast?Actionable Insights: Get a clear understanding of how audits work in the IT and cybersecurity domains.Expert Guidance: Rahul Sir shares hands-on experiences and valuable tips.Career Growth: Learn how IT audits are conducted and how they align with broader security frameworks.Whether you're an aspiring IT auditor, a cybersecurity professional, or a business leader, this podcast is your gateway to mastering the principles of IT and cybersecurity audits.#itaudit #internalauditor #internalaudit #cybersecuirty #infosecurity CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Instagtramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
38 minutes 45 seconds

Prabh Nair
Offensive Security Career Blueprint: CTFs, Build Your CV, and Master Concepts with Dhiraj & Prabh

Welcome to another insightful episode of our cybersecurity podcast! In this episode, Dhiraj and Prabh dive deep into the world of Offensive Security, discussing how freshers can kickstart their careers in cybersecurity. Whether you're just starting out or looking to level up, this episode is packed with practical advice and valuable insights.🎧 What You’ll Learn:Why Understanding Concepts Is More Important Than Tools: Dhiraj emphasizes why focusing on core concepts in cybersecurity will set you apart in the long run, rather than memorizing tools.Essential Steps for Freshers in Offensive Security: From building a GitHub profile to participating in Capture the Flag (CTF) events, Dhiraj offers practical advice on how to build your skills and credibility.Creating a Standout Cybersecurity CV: Learn how to craft a concise resume that highlights your skills and experiences, even if you're just starting out.The Power of Self-Learning & Blogging: Dhiraj explains why freshers should focus on self-learning and how sharing your knowledge through blogs and content creation can boost your career prospects.Certification Myths: Dhiraj debunks the misconception that certifications are a ticket to getting a job, suggesting that hands-on experience is far more valuable for freshers.🚀 Key Takeaways:Master the basics before diving into advanced tools.GitHub, LinkedIn, and Twitter can be your best friends in cybersecurity.Participate in CTFs, bug bounty programs, and open-source contributions to showcase your skills.Start with roles like security analyst or trainer to build foundational experience in offensive security.Books like Cryptography and Network Security by William Stallings can provide strong theoretical knowledge for beginners.🔧 Tools Discussed:NmapWiresharkMetasploitBurp SuitePlus, Hack The Box and VulnHub for hands-on practice!🌍 Resources Mentioned:Hack The Box: https://www.hackthebox.eu/VulnHub: https://www.vulnhub.com/HackerOne: https://www.hackerone.com/BugCrowd: https://www.bugcrowd.com/Dheeraj https://www.linkedin.com/in/mishradhiraj/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
58 minutes 43 seconds

Prabh Nair
Indian Airforce Officer Turns Cybersecurity Expert Cybersecurity

In this powerful podcast episode, Prabh sits down with Mr. Arun, a retired Indian Air Force officer, now a Product Lead at Microsoft, to explore the fascinating transition from military service to a thriving career in cybersecurity.Arun shares his personal journey, from an average student to an Air Force officer, and eventually into the high-stakes world of cybersecurity, consulting, and leadership. Whether you're a military veteran, career switcher, or cybersecurity enthusiast, this episode is full of actionable insights.Key Topics Covered:Transitioning from Military to Corporate: The mental and cultural shiftBreaking into Cybersecurity from Armed ForcesVeterans in Security: SOC, GRC, Architecture – Where to fit inImportance of networking, resume tailoring, and interview skillsThe power of discipline and integrity in a civilian workspaceAvoiding common mistakes during the transitionUsing military experience as your unique edge in tech rolesArun's transition journey from the Air Force to Tata Advance System Limited and finally to Microsoft Whether you're a military professional planning your next move, a recruiter working with veterans, or someone interested in cybersecurity careers, this episode delivers clarity, strategy, and motivation.Registrationhttps://traineuron.graphy.com/sessions/Breaking-into-a-cyber-security-role--military-to-corporate-transition--May-edition-67dfb668441c257bfbcd4c3dhttps://traineuron.graphy.com/sessions/Breaking-into-Product-Management-for-Military-Veterans--May-67c428e8fc3d5219928b9644🔗 Resources Shared in the Podcast:Arun's LinkedIn Profile: https://www.linkedin.com/in/squadarun/🔔 Don’t forget to Like, Subscribe, and Share this episode if you found it insightful!CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
1 hour 4 minutes 44 seconds

Prabh Nair
How Red Teams Are Hacking AI: Real-World Tactics with Mohamed Magdy

Red Teaming, LLM Hacking & AI Security with Mohamed Magdy (AbuMuslim) | Deep Dive for Cyber ProsIn this power-packed podcast episode, Prabh sits down with renowned Red Teamer and AI Security Expert, Mohamed Magdy (AbuMuslim) to break down the future of cybersecurity, LLM hacking techniques, and real-world red teaming operations.Whether you're exploring red team vs. blue team, penetration testing, or want to know how large language models (LLMs) like ChatGPT can be hacked or misused, this episode delivers practical insight, strategy, and next-gen security thinking. What You’ll Learn: What is Red Teaming in Cybersecurity?How LLMs can be attacked using prompt injection & adversarial inputThe intersection of AI, security, and ethical hacking How Red Teams are adapting to AI-powered environmentsReal-world red team scenarios & engagement tacticsRisks of using LLMs like ChatGPT, Claude, Gemini in enterprise settingsMohamed’s take on LLM jailbreaks, evasion techniques, and defense strategies Whether you’re new to Red Teaming, an AI enthusiast, or a cybersecurity leader, this is a must-watch conversation that combines offense + defense + future tech awareness.Connect with Mohamed Magdy (AbuMuslim): https://www.linkedin.com/in/m19o/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
44 minutes 39 seconds

Prabh Nair
Cloud Security Architecture Blueprint: From Log Analyst to Architect

Learn how to go from SOC log analyst to cloud-security architect—step by step. In this hands-on masterclass, Kushal Kumar (Security Architect, GoDaddy) shares hard-won lessons on designing secure AWS/Azure environments, avoiding common misconfigurations, and translating tech risk into business value.00:00 – 00:48 - Precap (Summary of previous podcast)00:48 – 01:37 - Start of conversation by welcoming guest01:37 - 03:04 - Introduction of Kushal and his hard work and career03:04 - 06:22 - Step-by-step journey process to become an architect06:22 - 15:06 - Become an architect from zero step by step15:06 - 16:26 - Tools used to design programs16:26 - 19:40 - Important characteristics19:40 - 22:00 - Architecture decisions22:00 - 25:15 - Secrets25:15 - 29:23 - Secret management pattern29:23 - 31:36 - Design principle keeping secrets 31:36 - 33:40 - Logging strategy33:40 - 36:06 - Log Sources36:06 - 37:40 - Cost effective log storage37:40 - 39:40 - Temperproof39:40 - 43:28 - First red flag you look for the vendor cloud architecture43:28 - 45:50 - Findings of architecture into the GRC45:50 - 48:33 - Checklist48:33 - 50:03 - End of the conversation with Vote of Thanks and future podcast50:03 - Share Opinions What You’ll LearnThe exact skills Kushal used to jump from log analysis to cloud security architectureTop 5 cloud mistakes to avoid (open S3 buckets, missing CloudTrail, static keys…)A 3-log starter kit (CloudTrail, VPC Flow Logs, AWS Config / Azure Policy)Secrets management on a budget—choosing vaults, IAM roles, and pre-commit hooksHow to translate architecture findings into non-tech language for the boardQuick checklist: IAM ✔︎ DDoS ✔︎ Data encryption ✔︎ Logging & monitoring ✔︎First red flags in vendor risk reviews (SOC 2, encryption, audit evidence)Linkedin Profilehttps://www.linkedin.com/in/kuskumar/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Prabhstudy

Show more...
2 months ago
50 minutes 21 seconds

Prabh Nair
AI Governance Simplified: From Zero to Pro

In this power-packed AI governance masterclass, I unpacks the critical building blocks of AI Governance – from strategy to policy, from legal liability to ethical AI deployment. Whether you're a security leader, policymaker, product head, or AI developer, this session will help you understand how to govern AI safely, ethically, and effectively.What is AI Governance?How to create a Responsible AI Framework?What are the legal risks and liabilities of AI?How to build an AI policy or AI strategy for your company?What are AI Governance models and best practices?CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE

Show more...
2 months ago
2 hours 12 minutes 20 seconds

Prabh Nair
Practical Cyber Audit 2

IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.

#audit #cybersecurity #infosec

Show more...
2 months ago
41 minutes 24 seconds

Prabh Nair
Practical IT CYBER Audit

IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.

#itaudit #cybersecurity #infosecaudit

Show more...
2 months ago
38 minutes 45 seconds

Prabh Nair
How CoinDCX Hacked - Detailed Story

1. Context

In July 2025, CoinDCX—one of India’s largest crypto exchanges—discovered a “sophisticated server breach” that drained $44.2 million (₹378–384 crore) from its internal hot wallet used for partner-exchange liquidity. Customer assets were safe in cold storage, and trading stayed live, but the scale of the loss stunned the industry.

Bengaluru City police arrested software engineer Rahul Agarwal, who’d received a WhatsApp “part-time job” offer on his work laptop. Investigators believe malware from those fake files stole his credentials, giving attackers full access. At 2:37 AM, they tested with 1 USDT—then at 9:40 AM, they automated six transfers totaling $44 million, morphing USDC/USDT into SOL, then WETH, and masking trails through Mayan Bridge, Wormhole, and Tornado Cash.

Before CoinDCX could speak, ethical hacker ZachXBT had already raised the alarm 17 hours earlier. As funds scattered through multiple wallets, the company raced to contain the breach, isolate Rahul’s account, and secure remaining systems—all while the blockchain forensics clock ticked.

CoinDCX pledged to cover the entire loss from its treasury, launched a Recovery Bounty Program offering 25 % (~$11 million) for fund-recovery tips, and partnered with CERT-In, Sygnia, and Seal911 for a deep forensic hunt. They arrested Rahul—who insists he was an unwitting tool—and confirmed user funds remained untouched.

This incident drives home three critical shifts for every crypto firm:

  1. Zero-trust internals—never rely on single-engineer credentials.

  2. Rigorous social-engineering drills—train staff to spot fake job offers.

  3. Cold-wallet primacy—keep operational funds minimal and move quickly offline.

By hardening internal controls and human defenses, exchanges can turn today’s headlines into tomorrow’s fortified frontlines.

2. Conflict3. Climax4. Conclusion5. Change (Lesson Learned)

Show more...
3 months ago
4 minutes 1 second

Prabh Nair
CISSP DOMAIN 7 Summary

CISSP Domain 7 Your last minute summary point


#cissp #cissp2025



Show more...
8 months ago
30 minutes 14 seconds

Prabh Nair
CISSP Domain 6: Security Assessment & Testing

Are you preparing for the CISSP certification and want to ace Domain 6: Security Assessment and Testing? This episode of CISSP Domain Sync is your ultimate guide to mastering security evaluation techniques, control validation, and compliance testing. We break down the core principles of security assessments, covering vulnerability assessments, penetration testing, audit strategies, security controls testing, risk analysis, and continuous monitoring—all crucial for real-world cybersecurity and CISSP exam success.

What You'll Learn:
The fundamentals of security assessments and audits

  • How to perform vulnerability scanning and penetration testing
    Risk-based testing strategies for compliance and governance
    Security control validation techniques every CISSP should know
    Continuous monitoring & security metrics for proactive defense


#CISSP #CYBERSECURITY #INFOSEC

Show more...
9 months ago
23 minutes 53 seconds

Prabh Nair
Episode 5- Ransomware Evolution: From Chaos to Billion-Dollar Crime

In this deep dive episode of Cyber Chronicles, we explore the dramatic evolution of ransomware—from its chaotic beginnings to its rise as a billion-dollar industry. Starting with the AIDS Trojan in the late 1980s, ransomware has transformed into a sophisticated, targeted tool wielded by cybercriminals and professional hacking groups.

Uncover the journey of ransomware, including:

  • The early attacks, such as CryptoLocker, which introduced unbreakable encryption and Bitcoin payments.
  • The rise of Ransomware-as-a-Service (RaaS), where groups like REvil and DarkSide offer hacking tools for profit-sharing.
  • A breakdown of double extortion tactics, where attackers not only encrypt data but also threaten to leak sensitive files.
  • The Colonial Pipeline attack, which caused fuel shortages in the U.S. and highlighted the vulnerabilities of critical infrastructure.

This episode takes you behind the scenes of ransomware’s transformation, explaining its technical evolution in simple terms. We also explore how businesses, hospitals, schools, and even governments have become prime targets in a cyber battlefield fueled by greed and opportunism.

From chaotic disruptions to targeted billion-dollar campaigns, ransomware is no longer just about holding files hostage—it’s a weapon reshaping cybersecurity priorities worldwide.

Key Takeaways Include:

  • Why ransomware attacks are growing in sophistication and scale.
  • The economic and operational impact of ransomware on industries.
  • Practical lessons on cyber hygiene, backup strategies, and patching to defend against ransomware.

Whether you’re a tech enthusiast, a business owner, or someone curious about the dark side of the digital world, this episode offers a captivating, detailed narrative that combines suspense with actionable insights.

Show more...
9 months ago
4 minutes 36 seconds

Prabh Nair
Episode 4 - NotPetya: The Malware That Destroyed Everything

In this gripping episode of Cyber Chronicles, we explore the story of NotPetya, a piece of malware that rewrote the rules of cyber warfare in June 2017. Disguised as ransomware, NotPetya spread rapidly across the globe, leaving behind a trail of destruction and causing over $10 billion in damages.

Discover how this devastating malware:

  • Exploited the stolen EternalBlue vulnerability from the NSA, combined with tools like Mimikatz to infiltrate networks.
  • Targeted Ukrainian systems through a compromised accounting software (MeDoc) but quickly spread to global giants like Maersk, Merck, and FedEx.
  • Locked critical systems by encrypting the Master Boot Record (MBR), rendering machines unusable.

Unlike traditional ransomware, NotPetya wasn’t about profit—it was about destruction. Believed to be a state-sponsored cyber weapon, it highlighted the vulnerability of global supply chains and critical infrastructure.

This episode breaks down the timeline of the attack, the technical details of how it spread, and the unprecedented impact on businesses, governments, and economies worldwide. We’ll also discuss the key lessons it taught us about cyber resilience, patch management, and the escalating stakes of cyber warfare.

Perfect for cybersecurity professionals, enthusiasts, or anyone curious about how a single piece of malware brought the world to its knees, this episode simplifies complex technicalities while delivering a suspenseful and educational narrative.

Show more...
9 months ago
4 minutes 28 seconds

Prabh Nair
Episode 3: Code Red: The Worm That Took Over the Internet

In this thrilling episode of Cyber Chronicles, we unravel the story of Code Red, the worm that shook the internet in 2001. At a time when the internet was becoming the backbone of global communication, a vulnerability in Microsoft’s IIS servers turned into a digital disaster.

Discover how this self-replicating worm exploited buffer overflow vulnerabilities, infected over 350,000 systems within hours, and launched a DDoS attack on the White House. From its rapid spread to its global impact, this episode explores:

  • The technical anatomy of Code Red, including how it found, exploited, and replicated through vulnerabilities.
  • The chaos it caused for governments, businesses, and IT administrators.
  • The lessons it taught about patching systems, proactive monitoring, and the dangers of interconnected networks.

We break down the technical details in simple terms, making it easy for everyone to understand how such a small piece of code created chaos on an unprecedented scale. This episode is a deep dive into one of the most significant early worm attacks, setting the stage for modern cyber threats.

Stay tuned as we connect the dots from Code Red to the evolution of malware and how it changed the rules of cybersecurity forever. Perfect for tech enthusiasts, cybersecurity professionals, and anyone curious about the internet’s vulnerabilities.

#cybersecurity #infosec #hacking #codered

Show more...
9 months ago
4 minutes 1 second

Prabh Nair
Episode 2: The Rise of Hackers: From Phreakers to Legends

Step into the world of early hackers in this fascinating episode of Cyber Chronicles. From the 1970s phone phreakers who discovered they could control phone systems with homemade tools to the 1980s pioneers who turned computers into their playground, this episode unravels the origins of modern hacking.

We dive deep into the stories of:

  • The 414s, teenage hackers who infiltrated nuclear research labs.
  • Kevin Mitnick, the world’s most wanted hacker, who turned social engineering into an art form.
  • The cultural shift from playful pranks to serious cyber exploits, laying the foundation for today’s cybersecurity landscape.

Through vivid storytelling and real-life examples, we explore how curiosity, innovation, and a desire to outsmart systems created the first wave of digital rebels. Discover the lessons these hackers taught the world about vulnerabilities, ethical hacking, and the thin line between genius and crime.

This episode is a thrilling ride into the past that sets the stage for the future of cybersecurity. Whether you're a tech enthusiast or just curious about the human side of hacking, this episode will keep you hooked till the end.


#cybersecurity #infosec #cyberhacking

Show more...
10 months ago
5 minutes 2 seconds

Prabh Nair
Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou