התחל במצב לא מקוון עם האפליקציה Player FM !
Defensive Security Podcast Episode 296
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on May 12, 2025 15:32 (
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 465678455 series 1344233
- Ransomware attackers are increasingly using insider threats to gain access.
- Greed can turn employees into insider threats, especially in tough economic times.
- LLM hijacking is a new tactic that exploits compromised API keys.
- Phishing simulations may create a rift between users and IT security teams.
- Punitive measures for phishing failures can lead to underreporting of actual attacks.
- Security awareness training should focus on protecting users, not punishing them.
- Adversaries are finding valid API keys to exploit cloud resources.
- The effectiveness of phishing simulations is being questioned by experts.
- Organizations need to do a better job at protecting their secrets and credentials.
- The cybersecurity landscape is rapidly evolving, requiring constant adaptation. Cybersecurity teams often feel like janitors cleaning up after others.
- Organizational dynamics can create resentment in security teams.
- Learning from incidents is crucial for improving security practices.
- Balancing security needs with business operations is essential.
- Generative AI presents both risks and opportunities for organizations.
- Effective governance is needed for AI usage in business.
- Security professionals must help businesses understand risk management.
- Building relationships across departments can improve security outcomes.
- AI tools should be used with proper agreements to protect data.
- The landscape of AI in business is rapidly evolving and requires adaptation.
Links
- https://www.scworld.com/news/ransomware-attackers-turn-to-workers-for-data-breach-access
- https://www.darkreading.com/application-security/llm-hijackers-deepseek-api-keys
- https://www.wsj.com/tech/cybersecurity/phishing-tests-the-bane-of-work-life-are-getting-meaner-76f30173
- https://www.securityweek.com/security-teams-pay-the-price-the-unfair-reality-of-cyber-incidents/
- https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts
288 פרקים
Defensive Security Podcast Episode 296
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on May 12, 2025 15:32 (
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 465678455 series 1344233
- Ransomware attackers are increasingly using insider threats to gain access.
- Greed can turn employees into insider threats, especially in tough economic times.
- LLM hijacking is a new tactic that exploits compromised API keys.
- Phishing simulations may create a rift between users and IT security teams.
- Punitive measures for phishing failures can lead to underreporting of actual attacks.
- Security awareness training should focus on protecting users, not punishing them.
- Adversaries are finding valid API keys to exploit cloud resources.
- The effectiveness of phishing simulations is being questioned by experts.
- Organizations need to do a better job at protecting their secrets and credentials.
- The cybersecurity landscape is rapidly evolving, requiring constant adaptation. Cybersecurity teams often feel like janitors cleaning up after others.
- Organizational dynamics can create resentment in security teams.
- Learning from incidents is crucial for improving security practices.
- Balancing security needs with business operations is essential.
- Generative AI presents both risks and opportunities for organizations.
- Effective governance is needed for AI usage in business.
- Security professionals must help businesses understand risk management.
- Building relationships across departments can improve security outcomes.
- AI tools should be used with proper agreements to protect data.
- The landscape of AI in business is rapidly evolving and requires adaptation.
Links
- https://www.scworld.com/news/ransomware-attackers-turn-to-workers-for-data-breach-access
- https://www.darkreading.com/application-security/llm-hijackers-deepseek-api-keys
- https://www.wsj.com/tech/cybersecurity/phishing-tests-the-bane-of-work-life-are-getting-meaner-76f30173
- https://www.securityweek.com/security-teams-pay-the-price-the-unfair-reality-of-cyber-incidents/
- https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts
288 פרקים
Alle episoder
×ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.