Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The 443 Podcast - Episode 307 -How To Deanonymize the TOR Network

This week on the podcast, we discuss how German law enforcement managed to deanonymize and arrest users on the TOR network. After that, we discuss why the US government is trying to ban Chinese-manufactured car hardware. We then end with a cool research article on chaining open redirect and iframe issues into a 1-click vulnerability that grants attackers access to arbitrary Google Docs files. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

What are Netacea Threat Intel Feeds?

Learn more about Netacea Threat Intel Feeds, including how our customers use them to harden existing defenses, from Netacea CTO & co-founder Andy Still. This video explains how Netacea ensures the accuracy of its threat intelligence, the methods of data distribution, and the practical uses of Threat Intel Feeds in blocking malicious traffic and aiding in decision-making processes.

Microsoft Exchange MFA for Outlook Desktop and Mobile Apps

Microsoft Exchange and Outlook Web App (OWA) are essential tools for enterprise communication, providing seamless access to emails, calendars, tasks, and contacts. However, with increasing cyber threats, relying on just usernames and passwords leaves your accounts vulnerable. miniOrange offers a robust Multi-Factor Authentication (MFA) solution for Exchange and OWA, adding an extra layer of security by requiring users to verify their identity through multiple methods. Even if credentials are compromised, MFA ensures your accounts remain protected.

Deep Learning Explained: Structured vs Unstructured Data | Razorthorn Security

Josh Neil explains the concept of deep learning and how it was designed to discover structure in unstructured data, such as images and text. Learn why this technology is key to advancements in cybersecurity. #DeepLearning #StructuredData #CyberSecurity.

Falcon Next-Gen SIEM - Detection Posture Management & Workflow Automation Enhancements

Crowdstrike's new detection posture management dashboard lets you visualize your detection posture like never before. Once you understand your current posture, the Falcon Platform empowers you to streamline prescriptive countermeasures in your workflows with the latest releases in Falcon Fusion. Our content library contains an ever growing collection of applications, actions, triggers, and playbooks that help you break down silos between teams and technologies. These innovations make it even more efficient for you and your team to respond faster than the adversaries, and ultimately stop the breach.