31 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities
Manage episode 474735980 series 2527257
In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several UK-based dating apps that led to the exposure of approximately 1.5 million private images. The discussion highlights how attackers are increasingly using legitimate software tools to bypass security measures, the implications of these breaches for users, and offers practical tips for maintaining robust cybersecurity.
00:00 Introduction to Today's Cyber Security News 00:29 Compromised Endpoint Detection and Response Systems 01:06 Bypassing Windows Defender: Methods and Implications 02:52 Ransomware Tactics and Legitimate Tool Exploits 04:20 Time Traveling Attacks and EDR Limitations 06:33 Massive Data Breach on X (Twitter) 08:30 UK Dating Apps Expose Private Images 10:47 Fraud Alerts and Scams 13:25 Conclusion and Final Thoughts
426 episodes
Manage episode 474735980 series 2527257
In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several UK-based dating apps that led to the exposure of approximately 1.5 million private images. The discussion highlights how attackers are increasingly using legitimate software tools to bypass security measures, the implications of these breaches for users, and offers practical tips for maintaining robust cybersecurity.
00:00 Introduction to Today's Cyber Security News 00:29 Compromised Endpoint Detection and Response Systems 01:06 Bypassing Windows Defender: Methods and Implications 02:52 Ransomware Tactics and Legitimate Tool Exploits 04:20 Time Traveling Attacks and EDR Limitations 06:33 Massive Data Breach on X (Twitter) 08:30 UK Dating Apps Expose Private Images 10:47 Fraud Alerts and Scams 13:25 Conclusion and Final Thoughts
426 episodes
All episodes
×
1 Cybersecurity Month in Review: Uncovering Digital and Physical Threats 48:37

1 Cyber Extortion, Ukraine's Cyber Offensive, and Chrome Trust Shake-up 12:19

1 Emergency Patches, Ransomware Exposes, and Rising QR Code Scams 10:51

1 Cybersecurity Incidents: Eddie Steeler Malware, ConnectWise Breach, and Nova Scotia Power Data Theft 8:27

1 Pig Butchering: Operation Shamrock Fights Back 39:05

1 Cybersecurity Today: Hijacker Scams, Ransomware Attacks, and Summer Travel Threats 13:33

1 Phishing Scams, DNS Hijacking, and Cybersecurity Leadership Shakeup 11:30

1 Unraveling Cyber Threats: Ransomware, Kidnapping, and Record-Breaking DDoS Attacks 9:47

1 From English Literature to Cybersecurity: A Journey Through Blockchain and Security 54:36

1 Cybersecurity Threats and Breaches: Critical Updates and Insights 11:24

1 Microsoft Emergency Patch, Pwn2Own Berlin 2025 Highlights, and Emerging Cybersecurity Threats 10:01

1 The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure 56:44

1 Cybersecurity Updates: Major Ransomware Attacks Thwarted and Illegal Marketplaces Shut Down 8:13

1 Mark's and Spencer Data Breach, Vulnerable Routers, Fortinet Exploits, and New Ransomware Threats 8:38

1 Cyber Threats Target HR, AI Tools, and Critical Infrastructure: A Comprehensive Update 8:07
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.