PodcastsTechnologyDecoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Edward Henriquez
Decoded: The Cybersecurity Podcast
Latest episode

210 episodes

  • Decoded: The Cybersecurity Podcast

    FS-ISAC Strategic Framework for Financial AI Risk Management

    29/1/2026 | 17 mins.
    This podcast serves as a comprehensive resource hub for financial institutions navigating the complex landscape of artificial intelligence. Provided by FS-ISAC, the materials highlight the dual nature of AI, focusing on its immense operational benefits alongside significant cybersecurity threats like deepfakes and fraud. The collection includes strategic business guidance and technical frameworks designed to help organizations manage data governance and risk assessments. By offering specialized podcasts, research papers, and policy templates, the source aims to foster the secure and ethical adoption of emerging technologies. Ultimately, these tools empower firms to refine their defensive postures while leveraging AI for long-term growth.
  • Decoded: The Cybersecurity Podcast

    Cybersecurity Weekly Briefing: Emerging Threats and Defensive Innovation

    26/1/2026 | 16 mins.
    This cybersecurity report highlights recent critical infrastructure threats, specifically noting a Russian-linked malware attempt against Poland’s power grid and persistent vulnerabilities in Fortinet and Telnet systems. It details defensive advancements, such as enhanced Kubernetes security and mathematical protocols for verifying digital media, while warning of the rise of malicious artificial intelligence. The document also covers industry news, including upcoming security conferences and the release of open-source intelligence tools designed to assist incident responders. Policy updates are featured as well, addressing law enforcement access to encrypted data and new European surveillance legislation. Finally, the briefing provides practical advice on stopping email-based attacks and mentions minor software updates from major tech providers.
  • Decoded: The Cybersecurity Podcast

    Under Armour Data Breach and MIGP Security Analysis

    23/1/2026 | 17 mins.
    In late 2025, the Everest ransomware group allegedly targeted Under Armour, leading to a massive data leak involving 72 million unique email addresses. Security platforms like Have I Been Pwned have indexed the stolen data, which reportedly includes sensitive details such as names, birthdates, and physical addresses. While the company has denied that its core systems or financial data were compromised, legal pressure is mounting through class action lawsuits regarding their security protocols. Parallel research into Compromised Credential Checking (C3) services suggests new ways to protect users from credential tweaking attacks following such leaks. This academic study proposes a system called Might I Get Pwned, which identifies passwords similar to those found in breaches while maintaining user privacy. Experts recommend that affected individuals monitor their accounts and update any reused passwords to mitigate the risk of targeted phishing.
  • Decoded: The Cybersecurity Podcast

    Zero Trust Segmentation: Halting Lateral Movement and Legacy Risk

    20/1/2026 | 14 mins.
    This podcast script explores the critical role of Zero Trust Segmentation in preventing cyberattacks from spreading through multicloud and legacy environments. The content highlights how modern breaches succeed not through initial entry, but via lateral movement across flat, over-permissive networks. Using Illumio as a primary example, the source explains how to isolate high-risk systems like Windows Server 2016 by enforcing least-privilege communication at the workload level. The material advocates for a shift from traditional perimeter security to a model centered on visibility, policy simulation, and containment. By focusing on intent-based labels rather than static IP addresses, organizations can create a unified security posture that protects hybrid infrastructures regardless of the platform. Ultimately, the guide teaches technical professionals how to ensure that even if a network is compromised, the blast radius is strictly limited.
  • Decoded: The Cybersecurity Podcast

    Operation MoneyMount-ISO: Phantom Stealer Deployment via ISO

    16/12/2025 | 37 mins.
    "Operation MoneyMount-ISO," an active cyber campaign originating from Russia that targets finance, accounting, and other related sectors through a sophisticated phishing scheme. The attack begins with a fake bank transfer confirmation email, written in formal Russian, which contains a malicious ZIP file leading to an ISO-mounted executable. This multi-stage infection ultimately deploys the Phantom Stealer malware, a potent information-stealing payload. Seqrite Labs’ research explains the malware’s capabilities, including extensive anti-analysis features, credential harvesting from browsers and crypto wallets, keylogging, clipboard monitoring, and data exfiltration via platforms like Telegram, Discord, and FTP. The operation is noted for its use of ISO mounting to bypass traditional email security controls, reflecting an increasing trend toward more complex initial access techniques for financially motivated cybercrime.

More Technology podcasts

About Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Podcast website

Listen to Decoded: The Cybersecurity Podcast, All-In with Chamath, Jason, Sacks & Friedberg and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Decoded: The Cybersecurity Podcast: Podcasts in Family

Social
v8.4.0 | © 2007-2026 radio.de GmbH
Generated: 2/5/2026 - 5:33:24 AM