The Daily Decrypt cover art

The Daily Decrypt

By: The Digital Security Collective
  • Summary

  • The Daily Decrypt is a podcast hosted by the Digital Security Collective where we strip down the complex world of cybersecurity into bite-sized, digestible nuggets of wisdom. With a sprinkle of humor, a dash of education, and a commitment to high-quality production, we're here to transform how you understand and interact with the cyber universe.
    The Digital Security Collective
    Show More Show Less
Episodes
  • 700,000 OpenSSH Servers at Risk, TeamViewer Breach, Cisco Zero-Day – CyberSecurity news
    Jul 2 2024

    In today's episode, we discuss TeamViewer's security breach by Midnight Blizzard, who extracted encrypted employee credentials but left customer data untouched (https://www.cybersecuritydive.com/news/teamviewers-breached-employee-credentials/720306/). We also cover Cisco's response to a zero-day flaw in NX-OS exploited by the Velvet Ant cyberespionage group to install custom malware (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP). Additionally, we explore the critical OpenSSH vulnerability, "regreSSHion," putting 700,000 servers at risk of remote code execution attacks (https://www.cybersecuritydive.com/news/openssh-remote-code-cve/720315/).

    Video Episode: https://youtu.be/sX082aW6clg

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags

    TeamViewer, Midnight Blizzard, breach, cyber threats, cybersecurity, employee data, network security, Velvet Ant, Cisco, NX-OS, CVE-2024-20399, vulnerability, OpenSSH servers, remote code execution, Qualys

    Search Phrases
    1. TeamViewer breach by Midnight Blizzard
    2. Midnight Blizzard cyber attack
    3. TeamViewer data security incident
    4. Velvet Ant Cisco NX-OS vulnerability
    5. Cisco NX-OS zero-day exploit
    6. CVE-2024-20399 patch details
    7. Critical OpenSSH server vulnerability
    8. Qualys remote code execution vulnerability
    9. Securing OpenSSH servers against regreSSHion
    10. Modern cybersecurity threats 2024
    Show More Show Less
    5 mins
  • Former IT Employee Data Breach, Critical D-Link Router Flaw, Microsoft Discloses More
    Jul 1 2024

    In today's episode, we discuss hackers exploiting a critical vulnerability in D-Link DIR-859 routers (CVE-2024-0769), compromising user credentials (source: https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-d-link-dir-859-router-flaw-to-steal-passwords/). We also cover Microsoft's recent notification about the widespread impact of Midnight Blizzard's password-spray attacks on enterprise emails (source: https://www.cybersecuritydive.com/news/microsoft-customers-compromised-threat-group/720173/). Lastly, we highlight a data breach at Geisinger, affecting over 1 million patients due to unauthorized access by a former Nuance employee (source: https://www.geisinger.org/about-geisinger/news-and-media/news-releases/2024/06/24/18/17/geisinger-provides-notice-of-nuances-data-security-incident).

    Video Episode: https://youtu.be/17B6IbSaarg

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags: Hackers, D-Link DIR-859, flaw, passwords, routers, network security, Microsoft, Midnight Blizzard, Sunburst attacks, enterprise email, cyber threats, Geisinger, data breach, sensitive data, IT security

    Search Phrases:

    1. How to secure D-Link DIR-859 router
    2. Hackers exploiting D-Link router flaws
    3. Midnight Blizzard Microsoft email breach
    4. Sunburst attacks enterprise impact
    5. Geisinger data breach patient safety
    6. Identifying misuse after a data breach
    7. Microsoft enterprise email vulnerability
    8. Protecting sensitive data from hackers
    9. Steps to secure outdated routers
    10. Recognizing red flags in data records
    Show More Show Less
    Less than 1 minute
  • I like to MOVEit MOVEit, Apple AirPods Eavesdropping, GitHub Credentials EXPOSED
    Jun 27 2024

    In today's episode, we delve into the recent vulnerabilities disclosed by Progress Software affecting MOVEit file-transfer service, explore how Apple patched a Bluetooth vulnerability in AirPods that could allow eavesdropping, and discuss Aqua Security's findings on the long-term exposure of sensitive data in Git repositories. For detailed information, visit the articles at https://www.cybersecuritydive.com/news/moveit-file-transfer-cves/719933/, https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html, and https://www.helpnetsecurity.com/2024/06/26/git-exposed-secrets/. Join us to understand the implications and recommended actions to protect your data.

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Video Episode: https://youtu.be/CEvyUdyil_A

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Cyberattacks, vulnerabilities, MOVEit, Progress Software, Apple, Bluetooth, AirPods, eavesdropping, Aqua Security, GitHub repositories, sensitive data, credentials, API tokens, cybersecurity, digital threats

    How to protect against MOVEit vulnerabilities, Apple fixes Bluetooth vulnerability in AirPods, preventing eavesdropping in AirPods, cybersecurity tips for MOVEit, Progress Software vulnerabilities update, Aqua Security reveals GitHub repository risks, securing sensitive data on GitHub, credentials exposed on GitHub, safeguarding against digital eavesdroppers, protecting sensitive data in software development

    Show More Show Less
    Less than 1 minute

What listeners say about The Daily Decrypt

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.