Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast - Episode 277 - A Blizzard of Threats

This week on the podcast, we cover two "Blizzard" threat actors targeting governments and private organizations. We also give an update to the SEC's compromised Twitter/X Account, and then end with a discussion of an EU program designed to improve their citizen's privacy while browsing the internet. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Unveiling Media Manipulation: Trust Erodes as the Cold Hard Facts Around COVID Unfold #podcast

Dive into the unsettling revelations surrounding media manipulation in the wake of COVID. Regardless of your stance on the pandemic, vaccine, or its origins, it's time to confront the alarming truth – information has been massively manipulated and suppressed. Join me in examining the cold, hard facts that have reshaped our perception of mainstream media.

What is SCA (Software Composition Analysis) software?

SCA or Software Composition Analysis is an important security tool that helps you understand how your application is made up. Our software is built from open-source components and these components can have vulnerabilities or simply be malicious. SCA scans our applications to identify these components and lets us know if there are vulnerabilities or issues within it. In this short video we explain what SCA tools are and how they work as well as there role in application and cyber security.

Minnesota Vikings and Arctic Wolf Create a Strong Defense

As the trusted security operations partner of the Minnesota Vikings, Arctic Wolf provides visibility, insights, and response to a myriad of cyber threats unique to the NFL team’s complex environment. Since the beginning of the partnership two years ago, Vice President of Information Technology Cheryl Nygaard has seen improvements in the organization’s security posture and feels confident about their cyber future.

Underground Alliances: State-Sponsored Hacking & Ransomware Realities Unveiled | Razorthorn Security

Uncover the covert world of state-sponsored hacking in our latest video. Explore how decent hacking groups showcase their skills, often in the realm of ransomware, to secure sponsorships through discreet back channels. These partnerships, sometimes with organizations linked to government-affiliated entities, provide the green light to target perceived adversaries. Has the spotlight dimmed on these activities? Quite the contrary – it's expanding.