![watering hole attack (noun) {Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
watering hole attack (noun) {Word Notes]
From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
23 Mars 20215min

Ideally, look for someone open to deception.
Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Atto...
18 Mars 202139min
![network telescope (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
network telescope (noun) [Word Notes]
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
16 Mars 20215min

Insider threats and security concerns for APIs.
Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up fr...
11 Mars 202138min
![SOC Triad (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
SOC Triad (noun) [Word Notes]
A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
9 Mars 20215min

Fraud activity within secure messaging apps in plain sight.
Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the fiv...
4 Mars 202141min
![supply chain attacks (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
supply chain attacks (noun) [Word Notes]
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's...
2 Mars 20215min

How likely are online users to reveal private information?
Guest Professor Lior Fink from Ben Gurion University shares insights from their study on "How We Can Be Manipulated Into Sharing Private Information Online," Dave's story is some good news about a Nig...
25 Feb 202133min



















