Artwork

Content provided by Insights Into Things. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Insights Into Things or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (VIDEO)

36:40
 
Share
 

Manage episode 485108544 series 3352756
Content provided by Insights Into Things. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Insights Into Things or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.

Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.

Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

  continue reading

530 episodes

Artwork
iconShare
 
Manage episode 485108544 series 3352756
Content provided by Insights Into Things. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Insights Into Things or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.

Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.

Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

  continue reading

530 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play