
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Korean cloud fire takes out nearly a petabyte of data. No backup. Can’t make this stuff up.

Quantum computers may never get there, but the regulators in many countries are preparing just in case they do.


You can outsource your work, but not your responsibility.

Allegedly published childrens’ photos and family data, and even called up parents to push for payment.

Your Smart TV is a server that sits alongside your work laptop and the rest of your home network…

How to stay secure in an AI attackers’ world. It’s not as scary as some people seem to think!

Most companies today have too many tools and not enough clarity.

AI is woven into to this cyberattack in several fascinating ways.

Agentic AI is transforming cybersecurity, but it’s not a substitute for human expertise. Here’s why.

Insider threats often involve bribery, corruption, and cold hard cash. But not always…

Learn about AD attacks and how hackers are getting access into your network.


Writing non-Play Store apps? You’ll have to show ID and pay a fee anyway.

What if your attackers don’t need any technical skills? What if you let them in yourself, simply by being too helpful?

Here’s how ID-based attacks can impact companies.

Korean cloud fire takes out nearly a petabyte of data. No backup. Can’t make this stuff up.

Quantum computers may never get there, but the regulators in many countries are preparing just in case they do.

You can outsource your work, but not your responsibility.
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Allegedly published childrens’ photos and family data, and even called up parents to push for payment.

Your Smart TV is a server that sits alongside your work laptop and the rest of your home network…

How to stay secure in an AI attackers’ world. It’s not as scary as some people seem to think!


Most companies today have too many tools and not enough clarity.




Learn about AD attacks and how hackers are getting access into your network.

Writing non-Play Store apps? You’ll have to show ID and pay a fee anyway.

What if your attackers don’t need any technical skills? What if you let them in yourself, simply by being too helpful?

Here’s how ID-based attacks can impact companies.


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






