התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות

104 - What is NetFlow Protocol used for? - Part 2
Manage episode 353846609 series 2872461
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
We will continue last week's topic on "What is Netflow Protocol used for". This is part 2. If you have not listen to last week's show, I suggest you listen to Part 1 first.
In addition, we will recap other trending security news including:
- Could Pakistan's nationwide power outage been caused by a cyber attack?
- GoTo, the parent company of LastPass was also breached.
-https://therecord.media: Pakistani authorities investigating if cyberattack caused nationwide-blackout
- https://www.goto.com/blog: Our response to a recent security incident
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
248 פרקים
Manage episode 353846609 series 2872461
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
We will continue last week's topic on "What is Netflow Protocol used for". This is part 2. If you have not listen to last week's show, I suggest you listen to Part 1 first.
In addition, we will recap other trending security news including:
- Could Pakistan's nationwide power outage been caused by a cyber attack?
- GoTo, the parent company of LastPass was also breached.
-https://therecord.media: Pakistani authorities investigating if cyberattack caused nationwide-blackout
- https://www.goto.com/blog: Our response to a recent security incident
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
248 פרקים
כל הפרקים
×1 248 - The Truth About Security Awareness Training- Why 95% of Programs Don't Work 29:11
1 247 - AI-Powered Browsers-The Privacy and Security Risks No One Talks About 23:48
1 246 - Is AI-Generated Code Safe-The Hidden Dangers of Vibe Coding 21:32
1 245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware 30:38
1 244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure 43:18
1 243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2 28:38
1 242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1 23:11
1 241 - AI vs. Cybersecurity-How LLMs Are Reshaping the Defender-Attacker Battle 55:17
1 240 - The Great OAuth Heist: How Salesloft's Breach Exposed Major Cybersecurity Firms 37:25
1 239 - Volt Typhoon Report-How Critical Infrastructure Was Targeted and Compromised 25:38
1 238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined 15:21
1 237 - Generative AI Security-How Companies Protect Against Attacks and Data Risks 22:35
1 236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability 30:31
1 235 - The Microsoft SharePoint vulnerability 27:51
1 234 - Protecting the Invisible-How to Secure Infrastructure without Agents 27:49
1 233 - CI-CD Pipelines and Associated Security Risks 27:33
1 231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage 29:15
1 228 - How the Emergence of AI-Powered Malware works 26:19
1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28
1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29
1 224 - Cisco Talos Year 2024 In Review 34:38
1 221 - FBI’s 2024 Annual Internet Crime Report 32:16
1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41
1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49
1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32
1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15
1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04
1 214 - What are polyglot files and how bad are they? 31:58
1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53
1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05
1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22
1 210 - Adversarial Misuse of Generative AI 50:21
1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38
1 207 - Microsoft Windows Actively Exploited Vulnerabilities 37:47
1 206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations 32:56
1 205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity 28:48
1 204 - Recap of the best episodes of 2024 1:31:38
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.











