Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast - Episode 259 - iPhone's Latest 0-Day

This week on the podcast, we cover Microsoft's final report on their July incident involving nation-state actors compromising enterprise email accounts. After that, we discuss a zero-day, zero-click vulnerability in iOS being actively exploited in the wild before ending with a chat about an upcoming change to how Android handles CA certificates. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Millions of Users on Freecycle are Compromised in Data Breach

Freecycle is an online platform dedicated to helping its users exchange free goods with one another. Freecycle is designed to help reduce waste by helping people give away their unwanted items instead of throwing them away. The platform has more than 7 million users and helps divert huge amounts of waste from landfills each year.

Why a Layered Security Strategy Matters

In the world of cybersecurity, one thing is certain: no system is immune to vulnerabilities and bugs. Even security software, designed to protect your organization, can have its flaws. But before you start to panic, consider this: the presence of these bugs is not unique to any single security provider. In fact, if you were to investigate the history of major security vendors, you would discover that they too have encountered similar problems.

Rubrik Incremental Merge: A New Approach to Oracle Backups

When the well-renowned Oracle database started penetrating the enterprise, database administrators typically backed up to tape and disk, with the former being the preferred target. To support the various tape and disk vendors in the marketplace, Oracle came up with the concept of a media management layer that allowed vendors to provide front-ends to their tape or disk devices.

Real-World Security Testing: Uncovering Vulnerabilities in Uninterrupted Power Supplies

Think your organization's security is rock-solid? It's time to put it to the real-world test! In this eye-opening video, we share a fascinating story of a security assessment that revealed some shocking vulnerabilities. When a company claimed to have a secure environment, they decided to take it a step further and put their confidence to the test. They asked, "Are you sure you want this real-world?" And the answer was a resounding "Yes!".

How to get AWS FTR approved with Jit security

Do you want to co-sell with AWS? Sharing and collaborating on leads and opportunities between you and AWS Sales? Then, you must complete the AWS FTR. AWS Partners must adopt specific best practices around security, reliability, and operational excellence defined by the AWS Well-Architected. This video will guide you through running your AWS FTR plan quickly and easily, getting FTR approved within weeks instead of months.

Qakbot Banking Trojan

Qakbot, also known as Pinkslipbot, Qbot and Quakbot, is a notorious Banking Trojan designed to steal account credentials and online banking session information leading to account takeover fraud. Commonly distributed via malicious unsolicited email (malspam), Qakbot campaigns reportedly deployed ‘Cobalt Strike’ beacons likely in an attempt to move laterally as well as gaining persistency and establishing a robust communication channel back to the threat actor.

The Importance of Defense and Depth in Cybersecurity

In today's digital landscape, defense and depth are absolutely crucial for the security of any organization. Join us as we delve into the world of cybersecurity with Arctic Wolf and explore the significance of this foundational concept. We'll take a deep dive into various aspects of defense and depth, including its role in safeguarding endpoint devices, securing network infrastructure, and protecting cloud resources. In a rapidly evolving threat landscape, it's essential to leave no stone unturned when it comes to security.