התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות

1 Dreka Gates: 60 Acres, a 7-Figure Wellness Empire, and the Moment She Reclaimed Her Power 36:12
73 - PowerShell - Use it wisely
Manage episode 336550222 series 2872461
Enjoying the content? Let us know your feedback!
It is time for YusufOnSecurity, welcome back once again!
The bad guys love using legitimate tools to circumvent security monitoring and controls. One tool in particular stands head and shoulder above other programs and operating system components to attack Microsoft Windows users: That is PowerShell.
In addition, we will recap other trending security news includes:
- https://www.bbc.com: Loosing removable drives with sensitive data
- www.bleepingcomputer.com: NSA shares tips on securing Windows devices with PowerShell
- www.theregister.com: Don't ditch PowerShell to improve security, say infosec agencies from UK, US, and NZ
- media.defense.gov: Keeping PowerShell: Security Measures to Use and Embrace (PDF)
- https://blog.talosintelligence.com: Hunting for LOLbins
-https://www.cisa.gov: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems
Be sure to subscribe!
If you like the content. Follow me on twitter @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
248 פרקים
Manage episode 336550222 series 2872461
Enjoying the content? Let us know your feedback!
It is time for YusufOnSecurity, welcome back once again!
The bad guys love using legitimate tools to circumvent security monitoring and controls. One tool in particular stands head and shoulder above other programs and operating system components to attack Microsoft Windows users: That is PowerShell.
In addition, we will recap other trending security news includes:
- https://www.bbc.com: Loosing removable drives with sensitive data
- www.bleepingcomputer.com: NSA shares tips on securing Windows devices with PowerShell
- www.theregister.com: Don't ditch PowerShell to improve security, say infosec agencies from UK, US, and NZ
- media.defense.gov: Keeping PowerShell: Security Measures to Use and Embrace (PDF)
- https://blog.talosintelligence.com: Hunting for LOLbins
-https://www.cisa.gov: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems
Be sure to subscribe!
If you like the content. Follow me on twitter @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
248 פרקים
כל הפרקים
×1 248 - The Truth About Security Awareness Training- Why 95% of Programs Don't Work 29:11
1 247 - AI-Powered Browsers-The Privacy and Security Risks No One Talks About 23:48
1 246 - Is AI-Generated Code Safe-The Hidden Dangers of Vibe Coding 21:32
1 245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware 30:38
1 244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure 43:18
1 243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2 28:38
1 242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1 23:11
1 241 - AI vs. Cybersecurity-How LLMs Are Reshaping the Defender-Attacker Battle 55:17
1 240 - The Great OAuth Heist: How Salesloft's Breach Exposed Major Cybersecurity Firms 37:25
1 239 - Volt Typhoon Report-How Critical Infrastructure Was Targeted and Compromised 25:38
1 238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined 15:21
1 237 - Generative AI Security-How Companies Protect Against Attacks and Data Risks 22:35
1 236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability 30:31
1 235 - The Microsoft SharePoint vulnerability 27:51
1 234 - Protecting the Invisible-How to Secure Infrastructure without Agents 27:49
1 233 - CI-CD Pipelines and Associated Security Risks 27:33
1 231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage 29:15
1 228 - How the Emergence of AI-Powered Malware works 26:19
1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28
1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29
1 224 - Cisco Talos Year 2024 In Review 34:38
1 221 - FBI’s 2024 Annual Internet Crime Report 32:16
1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41
1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49
1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32
1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15
1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04
1 214 - What are polyglot files and how bad are they? 31:58
1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53
1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05
1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22
1 210 - Adversarial Misuse of Generative AI 50:21
1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38
1 207 - Microsoft Windows Actively Exploited Vulnerabilities 37:47
1 206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations 32:56
1 205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity 28:48
1 204 - Recap of the best episodes of 2024 1:31:38
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.