התחל במצב לא מקוון עם האפליקציה Player FM !
76 - NIST’s Quantum-Resistant Algorithms
Manage episode 334882939 series 2872461
Enjoying the content? Let us know your feedback!
This week's episode is about what is giving us privacy at the heart of security, that is encryption algorithm. As computer power and speed improves so is the danger of these algorithm being broken. We need alternatives that can withstand them being compromised. We need resistant algorithms.
In addition, we will recap a couple of top of mind security news and then get into the meat of the matter on how to approach this pressing issue.
-https://www.microsoft.com: From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
- arstechnica.com: Ongoing phishing campaign can hack you even when you’re protected with MFA
- support.lenovo.com: Lenovo Notebook BIOS Vulnerabilities
- www.bleepingcomputer.com: New UEFI firmware flaws impact over 70 Lenovo laptop models
-https://www.nist.gov/news-events: NIST announces first four quantum resistant cryptographic algorithms
-https://www.pqsecurity.com: Post Quantum Standardization Discussion paper
Be sure to subscribe!
If you like the content. Follow me on twitter @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
231 פרקים
Manage episode 334882939 series 2872461
Enjoying the content? Let us know your feedback!
This week's episode is about what is giving us privacy at the heart of security, that is encryption algorithm. As computer power and speed improves so is the danger of these algorithm being broken. We need alternatives that can withstand them being compromised. We need resistant algorithms.
In addition, we will recap a couple of top of mind security news and then get into the meat of the matter on how to approach this pressing issue.
-https://www.microsoft.com: From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
- arstechnica.com: Ongoing phishing campaign can hack you even when you’re protected with MFA
- support.lenovo.com: Lenovo Notebook BIOS Vulnerabilities
- www.bleepingcomputer.com: New UEFI firmware flaws impact over 70 Lenovo laptop models
-https://www.nist.gov/news-events: NIST announces first four quantum resistant cryptographic algorithms
-https://www.pqsecurity.com: Post Quantum Standardization Discussion paper
Be sure to subscribe!
If you like the content. Follow me on twitter @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
231 פרקים
כל הפרקים
×
1 231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage 29:15



1 228 - How the Emergence of AI-Powered Malware works 26:19


1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28

1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29

1 224 - Cisco Talos Year 2024 In Review 34:38



1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41


1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58

1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53

1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05

1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22

1 210 - Adversarial Misuse of Generative AI 50:21


1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38

1 207 - Microsoft Windows Actively Exploited Vulnerabilities 37:47

1 206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations 32:56

1 205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity 28:48

1 204 - Recap of the best episodes of 2024 1:31:38

1 203 - Tips In Securing Your Organization - When the Security Team is Away 22:04

ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.