Artwork

Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Defensive Security Podcast Episode 288

59:58
 
Distribuie
 

Manage episode 454559330 series 1344233
Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

In this episode of the Defensive Security Podcast, we discuss the anticipated rise of Mac malware, the economic implications of new top-level domains (TLDs) for phishing, innovative phishing techniques using corrupt documents, and the risks associated with open-source software. We also explore the concept of risk homeostasis in cybersecurity, examining how users’ perceptions of security can influence their behavior and risk-taking. The conversation emphasizes the importance of education, robust security measures, and the need for a deeper understanding of complex systems in the face of evolving threats.

If you would like to support this podcast, please consider donating here: https://www.patreon.com/defensivesec

Links:

  • https://appleinsider.com/articles/24/12/04/what-a-new-threat-report-says-about-mac-malware-in-2024
  • https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/
  • https://www.bleepingcomputer.com/news/security/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security/
  • https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/ and https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
  continue reading

271 episoade

Artwork
iconDistribuie
 
Manage episode 454559330 series 1344233
Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

In this episode of the Defensive Security Podcast, we discuss the anticipated rise of Mac malware, the economic implications of new top-level domains (TLDs) for phishing, innovative phishing techniques using corrupt documents, and the risks associated with open-source software. We also explore the concept of risk homeostasis in cybersecurity, examining how users’ perceptions of security can influence their behavior and risk-taking. The conversation emphasizes the importance of education, robust security measures, and the need for a deeper understanding of complex systems in the face of evolving threats.

If you would like to support this podcast, please consider donating here: https://www.patreon.com/defensivesec

Links:

  • https://appleinsider.com/articles/24/12/04/what-a-new-threat-report-says-about-mac-malware-in-2024
  • https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/
  • https://www.bleepingcomputer.com/news/security/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security/
  • https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/ and https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
  continue reading

271 episoade

All episodes

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință