Ready to build cloud applications that attackers can’t break? In this in-depth podcast, cybersecurity host Prabh Nair sits down with his brother Pushpinder Singh—Cloud Security Architect, CCSP, AWS-Pro, Zero-Trust specialist—to unpack practical, real-world threat modeling. You’ll learn how to weave security into every sprint, cut through compliance noise, and ship code that’s resilient from day one.Pushpinder starts by breaking down STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), then shows how to map trust boundaries, data-flow diagrams (DFDs) and risk scores to the cloud stack—web front end, APIs, micro-services, payment gateways and AI workloads. Hear war-stories on adding multi-factor authentication, mutual TLS, input validation, encryption at rest/in transit and why early stakeholder buy-in crushes later rework.We dive into:Threat modeling vs secure design reviews—why both matter in DevSecOpsAdapting STRIDE, PASTA, DREAD, MAESTRO to SaaS, serverless and AI systemsBuilding living threat-model docs: scope, data flows, risk registers, Jira ticketsReal e-commerce demo: from login spoofing to tampering mitigation with signed tokensTrust-boundary pitfalls in hybrid / multi-cloud and how to segment for Zero TrustRapid response case study: choosing controls for payment and PII flows without killing agilitySneak peek at Pushpinder’s open-source threat-modeling tool (OWASP ASVS + SAM today, NIST soon)CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStick around for next steps: a live, hands-on STRIDE workshop and downloadable templates so you can start threat modeling your own projects tomorrow.#ThreatModeling #CloudSecurity #STRIDE #SecureSDLC #DevSecOps #ZeroTrust #Cybersecurity #SecurityArchitecture
Ready to build cloud applications that attackers can’t break? In this in-depth podcast, cybersecurity host Prabh Nair sits down with his brother Pushpinder Singh—Cloud Security Architect, CCSP, AWS-Pro, Zero-Trust specialist—to unpack practical, real-world threat modeling. You’ll learn how to weave security into every sprint, cut through compliance noise, and ship code that’s resilient from day one.Pushpinder starts by breaking down STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), then shows how to map trust boundaries, data-flow diagrams (DFDs) and risk scores to the cloud stack—web front end, APIs, micro-services, payment gateways and AI workloads. Hear war-stories on adding multi-factor authentication, mutual TLS, input validation, encryption at rest/in transit and why early stakeholder buy-in crushes later rework.We dive into:Threat modeling vs secure design reviews—why both matter in DevSecOpsAdapting STRIDE, PASTA, DREAD, MAESTRO to SaaS, serverless and AI systemsBuilding living threat-model docs: scope, data flows, risk registers, Jira ticketsReal e-commerce demo: from login spoofing to tampering mitigation with signed tokensTrust-boundary pitfalls in hybrid / multi-cloud and how to segment for Zero TrustRapid response case study: choosing controls for payment and PII flows without killing agilitySneak peek at Pushpinder’s open-source threat-modeling tool (OWASP ASVS + SAM today, NIST soon)CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStick around for next steps: a live, hands-on STRIDE workshop and downloadable templates so you can start threat modeling your own projects tomorrow.#ThreatModeling #CloudSecurity #STRIDE #SecureSDLC #DevSecOps #ZeroTrust #Cybersecurity #SecurityArchitecture
Inside the CISO playbook: communication, risk, crisis leadership, and boardroom strategy. In this episode, Prabh Nair and Sunil break down what a modern CISO actually does day to day, how to balance security with business, and how to turn chaos into clear decisions. We cover threat modeling, choosing frameworks, vulnerability prioritization with weighted context, building incident playbooks, RACI for accountability, reporting lines that work, and how to run board meetings that drive funding and trust. If you are aiming for CISO, supporting one, or interviewing for senior security roles, this is a practical masterclass.00:00 – 00:37 – Introduction and Guest Welcome00:37 – 02:50 – Experience of Sunil Varkey and his humanity02:50 - 05:31 - Origin story of Sunil Varkey05:31 – 07:32 - Role of CISO07:32 – 10:23 - How do you decide whether it goes to the board or just an email update when there is any brand new risk pop up10:23 – 14:28 - Handled crises Situation14:28 – 16:24 - Recall tough time - how do you frame the decision to business leaders still trusted you?16:24 – 21:35 - Any Use case21:35 – 30:47 - What does a single metrics help you to turn those boxes into real action30:47 – 34:36 - Three actions to prove truly to own the cyber risk34:36 – 39:10 - Reporting structure39:10 – 42:49 - Playbook for earning trust and Communication Matrix42:49 – 46:10 - Persistent myth about cyber budget46:10 – 56:10 - Good cyber reporting look like with example56:11 – 01:00:40 - Important things learned from this Podcast01:00:40 – 01:01:30 - Vote of ThanksWhat you will learn:CISO role, scope, and reporting models across industriesHow to brief executives with 5 key questions and clear metricsBuilding 15 incident playbooks and who to notify when things breakAsset visibility, configs, and vulnerability context that actually reduce riskRisk acceptance workflow with documented approvalsBudgeting for fundamentals and cutting tool overlapThreat modeling beyond initial architecture and WAF effectivenessHow to earn trust, manage politics, and run concise board reportsWho this is for:CISOs, Deputy CISOs, Heads of Security, aspiring leaders, security architects, and SOC managers who need practical leadership tactics, not theory.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Prabhstudy
In this deep-dive video, cybersecurity experts Shivendra and Prabh unravel the evolution of ransomware and reveal cutting-edge tactics for detecting, preventing, and responding to cyber attacks. Discover how ransomware has transformed over the years—from early malware infections to sophisticated, targeted assaults that threaten organizations and individuals alike.Key Discussion Points:Ransomware Evolution & Targeting Strategies:Understand how ransomware has shifted from random attacks to a highly targeted approach. Learn about notorious families like Logbit, Ryuk, Conti, and Black Cat, and explore how attackers exploit vulnerabilities and weak credentials during each phase of their operation.Attack Techniques & Prevention Methods:Get a breakdown of the techniques used by cybercriminals—from phishing emails and QR code scams to exploiting vulnerabilities like EternalBlue. Learn the importance of using tools such as Cobalt Strike and Mimikatz for post-exploitation, and why a deep understanding of these methods is essential for prevention.Proactive Cyber Defenses:Discover essential proactive defense strategies including endpoint security, next-generation antivirus (NGAV) tools, and regular patching. We discuss why employee training, regular system updates, and incident response planning are critical components in defending against ransomware.Detection & Monitoring:Dive into how organizations can detect ransomware attacks early by monitoring unusual network traffic, file renaming activities, and command-line executions. Learn about the role of Endpoint Detection and Response (EDR) tools in keeping your digital infrastructure secure.Backup Strategies & Incident Response:Learn the best practices for ransomware recovery, including the 3-2-1 backup strategy. Understand the importance of regular testing of backups, and discover how tabletop exercises and a robust incident response plan can help mitigate the impact of an attack.Advanced Negotiation & Communication Techniques:Explore the tactics used by the Black Cat ransomware group, including double encryption and negotiation strategies. Learn why negotiations should be handled by senior leadership and legal teams, not just technical staff, and the importance of secure, Tor-based communication methods.Next Steps & Call-to-Action:Subscribe & Engage:If you find these insights valuable, please hit the subscribe button and click the bell icon to receive notifications on future videos covering the latest in cybersecurity and ransomware trends.Feedback & Future Content:Leave a comment below if you’d like to see more expert discussions with Shivendra, or if there’s a particular cybersecurity topic you want us to explore.Actionable Steps for Organizations:Implement the 3-2-1 backup strategy.Conduct regular tabletop exercises.Educate employees on cybersecurity best practices and phishing awareness.Invest in proactive defenses like endpoint security and NGAV tools.Linkedin Profilehttps://www.linkedin.com/in/shivendra-kumar-singh-01/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.Rahul Sirhttps://www.linkedin.com/in/rahulkokcha/🔑 What You'll Learn:What is an IT Audit? – Understanding its purpose, scope, and importance.Principles of IT Auditing – Learn the foundational concepts that govern audits.End-to-End Audit Process – Explore the entire lifecycle of an IT audit, from planning to reporting.Cybersecurity and Security Audits – How IT audits intersect with cybersecurity and why they are crucial.Insights from Rahul Sir – Real-world experiences, challenges, and best practices in IT and cyber audits.🎯 Why Watch This Podcast?Actionable Insights: Get a clear understanding of how audits work in the IT and cybersecurity domains.Expert Guidance: Rahul Sir shares hands-on experiences and valuable tips.Career Growth: Learn how IT audits are conducted and how they align with broader security frameworks.Whether you're an aspiring IT auditor, a cybersecurity professional, or a business leader, this podcast is your gateway to mastering the principles of IT and cybersecurity audits.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Instagtramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.Rahul Sirhttps://www.linkedin.com/in/rahulkokcha/🔑 What You'll Learn:What is an IT Audit? – Understanding its purpose, scope, and importance.Principles of IT Auditing – Learn the foundational concepts that govern audits.End-to-End Audit Process – Explore the entire lifecycle of an IT audit, from planning to reporting.Cybersecurity and Security Audits – How IT audits intersect with cybersecurity and why they are crucial.Insights from Rahul Sir – Real-world experiences, challenges, and best practices in IT and cyber audits.🎯 Why Watch This Podcast?Actionable Insights: Get a clear understanding of how audits work in the IT and cybersecurity domains.Expert Guidance: Rahul Sir shares hands-on experiences and valuable tips.Career Growth: Learn how IT audits are conducted and how they align with broader security frameworks.Whether you're an aspiring IT auditor, a cybersecurity professional, or a business leader, this podcast is your gateway to mastering the principles of IT and cybersecurity audits.#itaudit #internalauditor #internalaudit #cybersecuirty #infosecurity CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Instagtramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
Welcome to another insightful episode of our cybersecurity podcast! In this episode, Dhiraj and Prabh dive deep into the world of Offensive Security, discussing how freshers can kickstart their careers in cybersecurity. Whether you're just starting out or looking to level up, this episode is packed with practical advice and valuable insights.🎧 What You’ll Learn:Why Understanding Concepts Is More Important Than Tools: Dhiraj emphasizes why focusing on core concepts in cybersecurity will set you apart in the long run, rather than memorizing tools.Essential Steps for Freshers in Offensive Security: From building a GitHub profile to participating in Capture the Flag (CTF) events, Dhiraj offers practical advice on how to build your skills and credibility.Creating a Standout Cybersecurity CV: Learn how to craft a concise resume that highlights your skills and experiences, even if you're just starting out.The Power of Self-Learning & Blogging: Dhiraj explains why freshers should focus on self-learning and how sharing your knowledge through blogs and content creation can boost your career prospects.Certification Myths: Dhiraj debunks the misconception that certifications are a ticket to getting a job, suggesting that hands-on experience is far more valuable for freshers.🚀 Key Takeaways:Master the basics before diving into advanced tools.GitHub, LinkedIn, and Twitter can be your best friends in cybersecurity.Participate in CTFs, bug bounty programs, and open-source contributions to showcase your skills.Start with roles like security analyst or trainer to build foundational experience in offensive security.Books like Cryptography and Network Security by William Stallings can provide strong theoretical knowledge for beginners.🔧 Tools Discussed:NmapWiresharkMetasploitBurp SuitePlus, Hack The Box and VulnHub for hands-on practice!🌍 Resources Mentioned:Hack The Box: https://www.hackthebox.eu/VulnHub: https://www.vulnhub.com/HackerOne: https://www.hackerone.com/BugCrowd: https://www.bugcrowd.com/Dheeraj https://www.linkedin.com/in/mishradhiraj/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
In this powerful podcast episode, Prabh sits down with Mr. Arun, a retired Indian Air Force officer, now a Product Lead at Microsoft, to explore the fascinating transition from military service to a thriving career in cybersecurity.Arun shares his personal journey, from an average student to an Air Force officer, and eventually into the high-stakes world of cybersecurity, consulting, and leadership. Whether you're a military veteran, career switcher, or cybersecurity enthusiast, this episode is full of actionable insights.Key Topics Covered:Transitioning from Military to Corporate: The mental and cultural shiftBreaking into Cybersecurity from Armed ForcesVeterans in Security: SOC, GRC, Architecture – Where to fit inImportance of networking, resume tailoring, and interview skillsThe power of discipline and integrity in a civilian workspaceAvoiding common mistakes during the transitionUsing military experience as your unique edge in tech rolesArun's transition journey from the Air Force to Tata Advance System Limited and finally to Microsoft Whether you're a military professional planning your next move, a recruiter working with veterans, or someone interested in cybersecurity careers, this episode delivers clarity, strategy, and motivation.Registrationhttps://traineuron.graphy.com/sessions/Breaking-into-a-cyber-security-role--military-to-corporate-transition--May-edition-67dfb668441c257bfbcd4c3dhttps://traineuron.graphy.com/sessions/Breaking-into-Product-Management-for-Military-Veterans--May-67c428e8fc3d5219928b9644🔗 Resources Shared in the Podcast:Arun's LinkedIn Profile: https://www.linkedin.com/in/squadarun/🔔 Don’t forget to Like, Subscribe, and Share this episode if you found it insightful!CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
Red Teaming, LLM Hacking & AI Security with Mohamed Magdy (AbuMuslim) | Deep Dive for Cyber ProsIn this power-packed podcast episode, Prabh sits down with renowned Red Teamer and AI Security Expert, Mohamed Magdy (AbuMuslim) to break down the future of cybersecurity, LLM hacking techniques, and real-world red teaming operations.Whether you're exploring red team vs. blue team, penetration testing, or want to know how large language models (LLMs) like ChatGPT can be hacked or misused, this episode delivers practical insight, strategy, and next-gen security thinking. What You’ll Learn: What is Red Teaming in Cybersecurity?How LLMs can be attacked using prompt injection & adversarial inputThe intersection of AI, security, and ethical hacking How Red Teams are adapting to AI-powered environmentsReal-world red team scenarios & engagement tacticsRisks of using LLMs like ChatGPT, Claude, Gemini in enterprise settingsMohamed’s take on LLM jailbreaks, evasion techniques, and defense strategies Whether you’re new to Red Teaming, an AI enthusiast, or a cybersecurity leader, this is a must-watch conversation that combines offense + defense + future tech awareness.Connect with Mohamed Magdy (AbuMuslim): https://www.linkedin.com/in/m19o/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
Learn how to go from SOC log analyst to cloud-security architect—step by step. In this hands-on masterclass, Kushal Kumar (Security Architect, GoDaddy) shares hard-won lessons on designing secure AWS/Azure environments, avoiding common misconfigurations, and translating tech risk into business value.00:00 – 00:48 - Precap (Summary of previous podcast)00:48 – 01:37 - Start of conversation by welcoming guest01:37 - 03:04 - Introduction of Kushal and his hard work and career03:04 - 06:22 - Step-by-step journey process to become an architect06:22 - 15:06 - Become an architect from zero step by step15:06 - 16:26 - Tools used to design programs16:26 - 19:40 - Important characteristics19:40 - 22:00 - Architecture decisions22:00 - 25:15 - Secrets25:15 - 29:23 - Secret management pattern29:23 - 31:36 - Design principle keeping secrets 31:36 - 33:40 - Logging strategy33:40 - 36:06 - Log Sources36:06 - 37:40 - Cost effective log storage37:40 - 39:40 - Temperproof39:40 - 43:28 - First red flag you look for the vendor cloud architecture43:28 - 45:50 - Findings of architecture into the GRC45:50 - 48:33 - Checklist48:33 - 50:03 - End of the conversation with Vote of Thanks and future podcast50:03 - Share Opinions What You’ll LearnThe exact skills Kushal used to jump from log analysis to cloud security architectureTop 5 cloud mistakes to avoid (open S3 buckets, missing CloudTrail, static keys…)A 3-log starter kit (CloudTrail, VPC Flow Logs, AWS Config / Azure Policy)Secrets management on a budget—choosing vaults, IAM roles, and pre-commit hooksHow to translate architecture findings into non-tech language for the boardQuick checklist: IAM ✔︎ DDoS ✔︎ Data encryption ✔︎ Logging & monitoring ✔︎First red flags in vendor risk reviews (SOC 2, encryption, audit evidence)Linkedin Profilehttps://www.linkedin.com/in/kuskumar/CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Prabhstudy
In this power-packed AI governance masterclass, I unpacks the critical building blocks of AI Governance – from strategy to policy, from legal liability to ethical AI deployment. Whether you're a security leader, policymaker, product head, or AI developer, this session will help you understand how to govern AI safely, ethically, and effectively.What is AI Governance?How to create a Responsible AI Framework?What are the legal risks and liabilities of AI?How to build an AI policy or AI strategy for your company?What are AI Governance models and best practices?CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/PrabhstudyMy Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.
#audit #cybersecurity #infosec
IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.
#itaudit #cybersecurity #infosecaudit
1. Context
In July 2025, CoinDCX—one of India’s largest crypto exchanges—discovered a “sophisticated server breach” that drained $44.2 million (₹378–384 crore) from its internal hot wallet used for partner-exchange liquidity. Customer assets were safe in cold storage, and trading stayed live, but the scale of the loss stunned the industry.
Bengaluru City police arrested software engineer Rahul Agarwal, who’d received a WhatsApp “part-time job” offer on his work laptop. Investigators believe malware from those fake files stole his credentials, giving attackers full access. At 2:37 AM, they tested with 1 USDT—then at 9:40 AM, they automated six transfers totaling $44 million, morphing USDC/USDT into SOL, then WETH, and masking trails through Mayan Bridge, Wormhole, and Tornado Cash.
Before CoinDCX could speak, ethical hacker ZachXBT had already raised the alarm 17 hours earlier. As funds scattered through multiple wallets, the company raced to contain the breach, isolate Rahul’s account, and secure remaining systems—all while the blockchain forensics clock ticked.
CoinDCX pledged to cover the entire loss from its treasury, launched a Recovery Bounty Program offering 25 % (~$11 million) for fund-recovery tips, and partnered with CERT-In, Sygnia, and Seal911 for a deep forensic hunt. They arrested Rahul—who insists he was an unwitting tool—and confirmed user funds remained untouched.
This incident drives home three critical shifts for every crypto firm:
Zero-trust internals—never rely on single-engineer credentials.
Rigorous social-engineering drills—train staff to spot fake job offers.
Cold-wallet primacy—keep operational funds minimal and move quickly offline.
By hardening internal controls and human defenses, exchanges can turn today’s headlines into tomorrow’s fortified frontlines.
2. Conflict3. Climax4. Conclusion5. Change (Lesson Learned)
CISSP Domain 7 Your last minute summary point
#cissp #cissp2025
Are you preparing for the CISSP certification and want to ace Domain 6: Security Assessment and Testing? This episode of CISSP Domain Sync is your ultimate guide to mastering security evaluation techniques, control validation, and compliance testing. We break down the core principles of security assessments, covering vulnerability assessments, penetration testing, audit strategies, security controls testing, risk analysis, and continuous monitoring—all crucial for real-world cybersecurity and CISSP exam success.
What You'll Learn:
The fundamentals of security assessments and audits
#CISSP #CYBERSECURITY #INFOSEC
In this deep dive episode of Cyber Chronicles, we explore the dramatic evolution of ransomware—from its chaotic beginnings to its rise as a billion-dollar industry. Starting with the AIDS Trojan in the late 1980s, ransomware has transformed into a sophisticated, targeted tool wielded by cybercriminals and professional hacking groups.
Uncover the journey of ransomware, including:
This episode takes you behind the scenes of ransomware’s transformation, explaining its technical evolution in simple terms. We also explore how businesses, hospitals, schools, and even governments have become prime targets in a cyber battlefield fueled by greed and opportunism.
From chaotic disruptions to targeted billion-dollar campaigns, ransomware is no longer just about holding files hostage—it’s a weapon reshaping cybersecurity priorities worldwide.
Key Takeaways Include:
Whether you’re a tech enthusiast, a business owner, or someone curious about the dark side of the digital world, this episode offers a captivating, detailed narrative that combines suspense with actionable insights.
In this gripping episode of Cyber Chronicles, we explore the story of NotPetya, a piece of malware that rewrote the rules of cyber warfare in June 2017. Disguised as ransomware, NotPetya spread rapidly across the globe, leaving behind a trail of destruction and causing over $10 billion in damages.
Discover how this devastating malware:
Unlike traditional ransomware, NotPetya wasn’t about profit—it was about destruction. Believed to be a state-sponsored cyber weapon, it highlighted the vulnerability of global supply chains and critical infrastructure.
This episode breaks down the timeline of the attack, the technical details of how it spread, and the unprecedented impact on businesses, governments, and economies worldwide. We’ll also discuss the key lessons it taught us about cyber resilience, patch management, and the escalating stakes of cyber warfare.
Perfect for cybersecurity professionals, enthusiasts, or anyone curious about how a single piece of malware brought the world to its knees, this episode simplifies complex technicalities while delivering a suspenseful and educational narrative.
In this thrilling episode of Cyber Chronicles, we unravel the story of Code Red, the worm that shook the internet in 2001. At a time when the internet was becoming the backbone of global communication, a vulnerability in Microsoft’s IIS servers turned into a digital disaster.
Discover how this self-replicating worm exploited buffer overflow vulnerabilities, infected over 350,000 systems within hours, and launched a DDoS attack on the White House. From its rapid spread to its global impact, this episode explores:
We break down the technical details in simple terms, making it easy for everyone to understand how such a small piece of code created chaos on an unprecedented scale. This episode is a deep dive into one of the most significant early worm attacks, setting the stage for modern cyber threats.
Stay tuned as we connect the dots from Code Red to the evolution of malware and how it changed the rules of cybersecurity forever. Perfect for tech enthusiasts, cybersecurity professionals, and anyone curious about the internet’s vulnerabilities.
#cybersecurity #infosec #hacking #codered
Step into the world of early hackers in this fascinating episode of Cyber Chronicles. From the 1970s phone phreakers who discovered they could control phone systems with homemade tools to the 1980s pioneers who turned computers into their playground, this episode unravels the origins of modern hacking.
We dive deep into the stories of:
Through vivid storytelling and real-life examples, we explore how curiosity, innovation, and a desire to outsmart systems created the first wave of digital rebels. Discover the lessons these hackers taught the world about vulnerabilities, ethical hacking, and the thin line between genius and crime.
This episode is a thrilling ride into the past that sets the stage for the future of cybersecurity. Whether you're a tech enthusiast or just curious about the human side of hacking, this episode will keep you hooked till the end.
#cybersecurity #infosec #cyberhacking