Episódios

  • macOS Terminal ClickFix attacks, Russian court sentences 'Flint', CareCloud probes data breach
    Mar 31 2026

    macOS Terminal gets ClickFix attacks

    Russian court sentences 'Flint' over card fraud

    CareCloud probes data breach

    Get the show notes here: https://cisoseries.com/cybersecurity-news-macos-terminal-clickfix-attacks-russian-court-sentences-flint-carecloud-probes-data-breach/

    Huge thanks to our sponsor, ThreatLocker

    Ransomware doesn't need to be sophisticated if it's allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com

    Exibir mais Exibir menos
    8 minutos
  • Department of Know: Gemini scours dark web, NSA worries about cybersecurity, APIs run loose
    Mar 30 2026

    Link to episode page

    This week's Department of Know is hosted by Rich Stroffolino with guests Dennis Pickett, vp, CISO, RTI International, and Jacob Combs, CISO, Tandem Diabetes Care

    Thanks to our show sponsor, ThreatLocker

    Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That's why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at ThreatLocker.com

    All links and the video of this episode can be found on CISO Series.com

    Exibir mais Exibir menos
    36 minutos
  • FBI email theft, Lloyds Bank glitch, API keys running loose
    Mar 30 2026

    FBI confirms theft of director's personal emails

    Lloyds customer data exposed in IT glitch

    Hundreds of valid API keys discovered on the Web

    Get the show notes here: https://cisoseries.com/cybersecurity-news-fbi-email-theft-lloyds-bank-glitch-api-keys-running-loose/

    Huge thanks to our sponsor, ThreatLocker

    Most breaches don't start with a zero-day — they start because something unexpected was allowed to run. One way organizations reduce risk is by shrinking the attack surface: deciding what software should be allowed to execute and blocking everything else by default. Fewer unknowns means fewer opportunities for attackers. Learn more at ThreatLocker.com

    Exibir mais Exibir menos
    8 minutos
  • Alleged RedLine dev extradited, Red Menshen spies with BPFDoor, is US cybersecurity slipping?
    Mar 27 2026

    Alleged RedLine dev extradited to US

    Red Menshen uses BPFDoor to spy

    Former NSA chiefs worry US cybersecurity is slipping

    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-alleged-redline-dev-extradited-red-menshen-spies-with-bpfdoor-is-us-cybersecurity-slipping/

    Huge thanks to our sponsor, ThreatLocker

    Security controls fail when they break the business. Successful teams phase in protections gradually — starting with visibility, then moving to enforcement. That approach allows organizations to reduce risk without overwhelming IT teams or disrupting critical workflows. Learn more at ThreatLocker.com

    Exibir mais Exibir menos
    8 minutos
  • Torg Grabber targets crypto, TeamPCP backdoors LiteLLM, GitHub AI bug detection
    Mar 26 2026

    Torg Grabber targets crypto wallets

    TeamPCP backdoors LiteLLM

    GitHub adds AI security bug detection

    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-torg-grabber-targets-crypto-teampcp-backdoors-litellm-github-ai-bug-detection/

    Huge thanks to our sponsor, ThreatLocker

    Detection-based security assumes you'll catch an attack in time. Control-based security assumes you won't. That mindset shift is driving more organizations to focus on preventative controls — stopping unknown execution and unauthorized privilege elevation instead of relying solely on alerts after the fact. Learn more at ThreatLocker.com

    Exibir mais Exibir menos
    8 minutos
  • FCC router ban, drone hit AWS, Crunchroll leak
    Mar 25 2026

    FCC bans foreign routers

    Drone activity disrupts AWS region

    Crunchyroll confirmed data leak

    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-fcc-router-ban-drone-hit-aws-crunchroll-leak/

    Huge thanks to our sponsor, ThreatLocker

    Least privilege isn't about distrusting users — it's about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can't easily escalate access or move laterally across the environment. Learn more at ThreatLocker.com

    Exibir mais Exibir menos
    7 minutos
  • DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands
    Mar 24 2026

    New DarkSword exploit hits GitHub

    Gemini AI agents scour the dark web

    Trivy supply chain attack expands

    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-darksword-exploit-hits-github-gemini-ai-agents-scour-dark-web-trivy-supply-chain-attack-expands/

    Huge thanks to our sponsor, ThreatLocker

    Ransomware doesn't need to be sophisticated if it's allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com

    Exibir mais Exibir menos
    8 minutos
  • Department of Know: SaaS apps enable breaches, real-time cyber protection, IoT botnet takedown
    Mar 23 2026

    Link to episode page

    This week's Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, CISO, Supabase, and Chris Ray, Field CTO, GigaOm

    Thanks to our show sponsor, ThreatLocker

    Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That's why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at ThreatLocker.com

    All links and the video of this episode can be found on CISO Series.com

    Exibir mais Exibir menos
    32 minutos