by Resourcely Pod
Join security experts Travis McPeak, Anna Westelius, William Bengtson and Leif Dreizler as they talk all things cybersecurity!
Language
🇺🇲
Publishing Since
11/3/2022
Email Addresses
1 available
Phone Numbers
0 available
March 31, 2025
<p>🎙️Welcome to episode 27! In this episode, we dive into the latest security news and insights with your hosts,Travis McPeak, Will Bengtson and Leif Dreizler.</p><p>Highlights:</p><ul><li><p>🚨 Insider threats are real! Join us as we discuss a wild corporate espionage case between Deal and Rippling. You won’t believe what happened! </p></li></ul><ul><li><p>💰 Google just dropped $32 billion on Wiz! What does this mean for the future of cloud security? </p></li></ul><ul><li><p>🛻 Jaguar Land Rover Data Breach: A ransomware attack reveals vulnerabilities in credential management and the importance of dark web monitoring.</p></li></ul><ul><li><p>🕵️♂️ Ever heard of LLM poisoning? We’re exploring how misinformation is affecting AI models.</p></li></ul><ul><li><p>💸Crypto Heist Analysis: A deep dive into the SafeWallet heist, examining the operational security mistakes made by the attackers.</p></li></ul><p>Join us as we break down this week’s biggest security stories, so you don’t have to. Don't forget to like and subscribe!</p>
March 5, 2025
<p>🎙️ We’re back with another exciting episode of our podcast, where we dive into the latest trends and stories in the world of security! In this episode, Travis McPeak and Will Bengtson welcome our special guest, Misha Kuenstner, a Security Engineering Manager at Semgrep. </p><p>We cover a range of topics, including:</p><ul><li><p> 🛌 A deep dive into a recent security vulnerability involving Eight Sleep covers, where researchers discovered alarming access issues.</p></li><li><p>🥒 The implications of Hugging Face models being susceptible to local execution due to the use of Python's Pickle serialization.</p></li><li><p>🛡️ Insights from the first-ever State of Detection Engineering report, highlighting the evolving skills needed in detection and response.</p></li><li><p>☁️ A discussion on the recent CVE related to unauthenticated username enumeration in AWS and its impact on cloud security.</p></li><li><p>✉️ Google's announcement to replace SMS authentication with QR codes for Gmail, aiming to enhance security.</p></li></ul><p>Tune in to hear our thoughts, insights, and recommendations on these pressing security issues. Don't forget to like, subscribe, and hit the notification bell for more episodes!</p><p><br /></p>
January 31, 2025
<p><strong>🎙️</strong>Join us for another episode of the 404:Security Not Found podcast! This week, Travis McPeak, Swathi Joshi and Will Bengtson discuss the latest trends in cybersecurity, including Microsoft's push towards a passwordless future and the implications of AI in spear phishing attacks.</p> <p>In this episode, we cover:</p> <ul> <li><p>🛡️ Microsoft's significant changes impacting over a billion users as they move towards a passwordless future.</p> </li> <li><p>🤖 A report from Malwarebytes on AI-powered spear phishing attacks and their alarming effectiveness.</p> </li> <li><p>The discovery of a malicious NPM package and the ongoing challenges of package squatting.</p> </li> <li><p>The recent pardon of Silk Road creator Ross Ulbricht and its implications.</p> </li> <li><p>A fascinating discussion on canaries in cybersecurity and their maturity model.</p> </li> <li><p>💔 A heartbreaking story of a woman scammed out of her life savings through a deepfake scam involving a fake Brad Pitt.</p> </li> </ul> <p>Don't forget to like and subscribe for more episodes!</p> <p>Thanks for listening!</p>
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.