PodcastsNotíciasCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Último episódio

1719 episódios

  • Cybersecurity Headlines

    Rituals cosmetics breach, FBI iOS flaw fixed, Teams Helpdesk impersonation

    24/04/2026 | 8min
    Cosmetics giant Rituals discloses data breach
    Apple fixes iOS flaw exploited by the FBI
    Microsoft Teams Helpdesk impersonation
    Get the show notes here: https://cisoseries.com/cybersecurity-news-rituals-cosmetics-breach-fbi-ios-flaw-fixed-teams-helpdesk-malware-impersonation/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    New OpenAI cyber product, unauthorized Mythos access, insurers to cap LLMjacking payouts

    23/04/2026 | 7min
    OpenAI shares cyber product with government orgs
    Unauthorized Mythos access, Firebox bugs fixed by Mythos
    Insurers move to cap LLMjacking cyber payouts
    Get the show notes here: https://cisoseries.com/cybersecurity-news-new-openai-cyber-product-unauthorized-mythos-access-insurers-to-cap-llmjacking-payouts/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    CISA lacks Mythos, Lovable's leak by design, YouTube's deepfake detection

    22/04/2026 | 7min
    CISA lacks Mythos access
    Lovable denies data leak
    YouTube opens up deepfake detection tool
    Get the show notes here: https://cisoseries.com/cybersecurity-news-cisa-lacks-mythos-lovables-leak-by-design-youtubes-deepfake-detection/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Vercel breach, ZionSiphon targets water infrastructure, Bluesky DDoS

    21/04/2026 | 7min
    Vercel confirms breach, stolen data for sale
    ZionSiphon targets water infrastructure
    Bluesky blames outage on DDoS
    Get the show notes here: https://cisoseries.com/cybersecurity-news-vercel-breach-zionsiphon-targets-water-infrastructure-bluesky-ddos/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    London hospital ransomware legacy, PowerOFF takedown, Microsoft RedSun zero-day

    20/04/2026 | 8min
    London hospitals continue to suffer from 2024 ransomware attack
    Four arrested in PowerOFF takedown
    Microsoft Defender "RedSun" zero-day 
    Get the show notes here: https://cisoseries.com/cybersecurity-news-london-hospital-ransomware-legacy-poweroff-takedown-microsoft-redsun-zero-day/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.

Mais podcasts de Notícias

Sobre Cybersecurity Headlines

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Site de podcast

Ouça Cybersecurity Headlines, Calma Urgente e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções

Cybersecurity Headlines: Podcast do grupo

Informação legal
Aplicações
Social
v8.8.12| © 2007-2026 radio.de GmbH
Generated: 4/24/2026 - 11:53:48 AM