Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast - Episode 287 - Ending Session Hijacking

This week on the podcast, we cover a Google initiative to kill off session hijacking attacks once and for all. Before that, we give an analysis of CVE-2023-3400, the Palo Alto zero-day vulnerability currently under active exploit. Additionally, we discuss a recent white paper from CISA on securely deploying artificial intelligence systems. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Why you NEED an Open Source Vulnerability Scanner

Here are 7 reasons why you need an open source vulnerability scanner. ✍️ Resources ✍️ ⏲️ Chapters ⏲️ ⚒️ About Snyk ⚒️ Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Revolutionizing Daily Tech: AI's Role in Our Everyday Lives

Dive into the fascinating world of how artificial intelligence is seamlessly woven into the fabric of our daily technology, transforming the mundane into the extraordinary. At Brivo, we've been at the forefront of integrating generative AI into cloud-based solutions, redefining what's possible in commercial real estate, multifamily residential, and large distributed enterprises. Join us as we explore the endless possibilities that AI brings to everyday technology, making our lives more secure, efficient, and connected.

10 Important Data Privacy Questions You Should be Asking Now

As data breaches continue to rise, businesses face significant financial losses. The recent $350 million loss incurred by T-Mobile underscores the urgency of addressing data theft. Despite these challenges, many companies overlook data privacy, extending the risk of further breaches. In this article, we explore why data privacy is crucial for businesses, and address important data privacy questions you should be asking now.

EDR - The Multi-Tool of Security Defenses

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. If your organization has computers, and I’m sure it does, then it's likely it has an Endpoint Detection and Response (EDR) solution installed. Since the capabilities of EDR solutions have changed over the years, it’s recommended to re-evaluate the solution’s features periodically to ensure it is up to date.

What Is Cloud Security?

Cloud computing has gained traction in recent years due to its ease of scalability, flexibility, and efficiency. It allows businesses to accelerate innovation and spend less in meeting client or consumer demands. With several businesses migrating their operations to the cloud, cloud computing has become the technology of choice as it becomes more readily accessible and affordable.

6 Airbnb Scams To Watch Out For

Airbnb has brought a new paradigm to the hospitality industry. It has become the go-to platform for persons looking to make additional income with their properties and travelers looking for unique accommodation experiences away from home. However, this new model and its appeal have also attracted individuals looking to exploit the platform for fraud. Scams on Airbnb are becoming increasingly common, as both hosts and guests are not left out from becoming targets.

Credit Card vs Debit Card: Which Is Safer?

Identity theft and card fraud are the main concerns associated with using debit and credit cards. Like any financial instrument, credit and debit cards are susceptible to certain security threats that can compromise cardholders' information and lead to credit card fraud or debit card fraud. Common examples of such financial security threats include card theft, phishing, skimming, malware, card cloning, vishing, weak passwords/PINs, and social engineering.