Cyberside Chats: Cybersecurity Insights from the Experts

Total duration:12 h 37 min
Inside Jobs: How CrowdStrike, DigitalMint & Tesla Got Burned
Cyberside Chats: Cybersecurity Insights from the Experts
23:27
Made in China—Hacked Everywhere?
Cyberside Chats: Cybersecurity Insights from the Experts
25:46
Holiday Hackers—The 2025 AI Fraud Boom
Cyberside Chats: Cybersecurity Insights from the Experts
14:07
LOUVRE Was the Password?! Cybersecurity Lessons from the Heist
Cyberside Chats: Cybersecurity Insights from the Experts
17:53
Poisoned Search: How Hackers Turn Google Results into Backdoors
Cyberside Chats: Cybersecurity Insights from the Experts
21:10
The AWS Outage and Hidden Fourth-Party Risks
Cyberside Chats: Cybersecurity Insights from the Experts
14:36
Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack
Cyberside Chats: Cybersecurity Insights from the Experts
19:37
The Power of “Why” – Communicating Cybersecurity Effectively
Cyberside Chats: Cybersecurity Insights from the Experts
24:14
Shutdown Fallout: The Cybersecurity Information Sharing Act Expires
Cyberside Chats: Cybersecurity Insights from the Experts
17:21
Inside the Spider’s Web: What Indictments Reveal About Scattered Spider
Cyberside Chats: Cybersecurity Insights from the Experts
19:25
Vibe Hacking: The Dark Side of AI Coding
Cyberside Chats: Cybersecurity Insights from the Experts
27:47
The Saga Continues: More Dirt on the Salesforce–Drift Breach
Cyberside Chats: Cybersecurity Insights from the Experts
16:58
Connected App, Connected Risk: The Salesforce–Drift Incident
Cyberside Chats: Cybersecurity Insights from the Experts
13:54
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked
Cyberside Chats: Cybersecurity Insights from the Experts
28:51
Printer Problems: Trump, Putin, and a Costly Mistake
Cyberside Chats: Cybersecurity Insights from the Experts
15:51
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
Cyberside Chats: Cybersecurity Insights from the Experts
14:25
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies
Cyberside Chats: Cybersecurity Insights from the Experts
14:28
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security
Cyberside Chats: Cybersecurity Insights from the Experts
21:37
Iran’s Cyber Surge: Attacks Intensify in 2025
Cyberside Chats: Cybersecurity Insights from the Experts
28:02
Leaked and Loaded: DOGE’s API Key Crisis
Cyberside Chats: Cybersecurity Insights from the Experts
15:22
Holiday Horror Stories: Why Hackers Love Long Weekends
Cyberside Chats: Cybersecurity Insights from the Experts
22:09
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
Cyberside Chats: Cybersecurity Insights from the Experts
19:39
No Lock, Just Leak
Cyberside Chats: Cybersecurity Insights from the Experts
14:55
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
Cyberside Chats: Cybersecurity Insights from the Experts
13:54
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
Cyberside Chats: Cybersecurity Insights from the Experts
26:27
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
Cyberside Chats: Cybersecurity Insights from the Experts
17:57
How Hackers Get In: Penetration Testing Secrets from the Front Line
Cyberside Chats: Cybersecurity Insights from the Experts
26:24
Afterlife Access: Cybersecurity Planning for When You’re Gone
Cyberside Chats: Cybersecurity Insights from the Experts
16:52
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
Cyberside Chats: Cybersecurity Insights from the Experts
12:31
Network for Rent: The Criminal Market Built on Outdated Routers
Cyberside Chats: Cybersecurity Insights from the Experts
09:37
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
Cyberside Chats: Cybersecurity Insights from the Experts
19:29
Quantum Shift: How Cybersecurity Must Evolve Now
Cyberside Chats: Cybersecurity Insights from the Experts
20:41
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
Cyberside Chats: Cybersecurity Insights from the Experts
16:01
23andMe: Breaches, Bankruptcy, and Security
Cyberside Chats: Cybersecurity Insights from the Experts
13:42
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
Cyberside Chats: Cybersecurity Insights from the Experts
17:34
The Encryption Battle: Security Savior or Cyber Risk?
Cyberside Chats: Cybersecurity Insights from the Experts
25:22
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
Cyberside Chats: Cybersecurity Insights from the Experts
13:46
Wiretapped: How Hackers Infiltrated Global Telecom Networks
Cyberside Chats: Cybersecurity Insights from the Experts
14:54
When Microsoft Goes Down: Cyber Risk & Resilience
Cyberside Chats: Cybersecurity Insights from the Experts
14:57
Abandoned S3 Buckets – A Goldmine for Hackers
Cyberside Chats: Cybersecurity Insights from the Experts
25:21