Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 minutes of audio is all it takes to clone your voice #cybersecurity #AI

Just five minutes of audio is all it takes to create a convincing real-time voice clone, no specialized hardware or massive datasets needed. In this week's episode of The Cybersecurity Defenders Podcast, we cover the latest threats from voice cloning technology to China-linked infrastructure attacks. NCC Group researchers used cloned voices to extract confidential data from real organizations. But the bigger threat isn't corporate espionage. It's everyday scams becoming far more convincing.

Intel Chat: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested [256]

Intel Chat - Episode 256: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested A podcast about cybersecurity and the people that keep the internet safe. New episodes drop weekly. Chris and Matt dive into critical vulnerabilities, sophisticated threat actors, and emerging attack vectors. From a 13-year-old Redis vulnerability with active exploitation to China-linked espionage targeting infrastructure blind spots, this episode covers some of the most significant security developments impacting organizations today.

We need to redefine "critical infrastructure" #cybersecurity #ransomware #criticalinfrastructure

When a city gets hit with ransomware, residents can't pay utility bills, access emergency services, or even get married. When the water treatment plant goes down, the hospital can't operate, no matter how well you've secured it. We've been asking the wrong question. Instead of "does this technically qualify as critical infrastructure?" we should be asking "who needs help?" Small organizations like schools, nonprofits, water systems, and local governments face the same cybersecurity challenges but lack the resources to defend themselves.

Identity automation in the age of agentic AI with Matthew Chiodi

Defender Fridays - Identity Automation in the Age of Agentic AI with Matthew Chiodi Join us for this session of Defender Fridays as we explore identity automation in the age of agentic AI with Matthew Chiodi, Chief Strategy Officer at Cerby. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Roadmap to Community Cyber Defense with Sarah Powazek, Program Director, UC Berkeley CLTC [254]

Cybersecurity Defenders Podcast - Episode 254: Roadmap to Community Cyber Defense with Sarah Powazek, Program Director, UC Berkeley CLTC A podcast about cybersecurity and the people that keep the internet safe.

Building the Strelka file scanning system with Josh Liburdi

Josh Liburdi, Principal Engineer of Security Operations at DoorDash, joined Defender Fridays to talk about building the Strelka file scanning system. Defender Fridays creates a collaborative space for security professionals to share ideas and experiences through informal, interactive conversations. All skill levels welcome - come learn alongside fellow defenders!

Intel Chat: NYC SIM server, Nimbus Manticore, ads target macOS, SpamGPT & GitHub NPM changes [252]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Security Potpourri: SOCs, automation, and penetration testing with Cliff Janzen

Cliff Janzen, CISO and VP of Security Services at Arctiq, joined us for Defender Fridays for a special "Security Potpourri" session! What's on the menu? > SOC operations and optimization> Security automation strategies> Penetration testing insights> The current state of security landscape> All through Cliff's expert lens and real-world experience.

Have we reached true anonymous AI? #cybersecurity #ai

PromptLock ransomware represents a chilling evolution: AI that makes real-time decisions about your data. Unlike traditional ransomware that blindly encrypts everything, this malware uses a locally-hosted LLM to analyze file contents and decide whether to exfiltrate or encrypt based on what it finds. It's essentially agentic AI making autonomous threat decisions.