Decoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.

Episodes

May 13, 2025 21 mins

These sources collectively cover Microsoft's May 2025 Patch Tuesday, detailing the security updates released on May 13, 2025. Multiple articles highlight that these updates address a significant number of vulnerabilities, including several actively exploited zero-day flaws and others rated as critical. One source from Forbes specifically mentions a critical 10/10 cloud security vulnerability that has been confirmed and mitigated by...

Mark as Played

These sources collectively discuss the evolving landscape of cyber threats, including the increasing complexity of attacks involving multiple threat actors and the challenges this presents for traditional analysis models. One source provides a comprehensive curated list of resources for threat intelligence, covering sources of information, analytical frameworks, and tools for investigating cyber threats. Another source explores the...

Mark as Played
May 8, 2025 14 mins

InfoSec discusses several critical cybersecurity developments and strategies. It highlights the active exploitation of vulnerabilities in software like Langflow and WordPress plugins, and notes an increase in unsophisticated attacks targeting industrial control systems. The article also offers advice on securing cross-account access in cloud environments, provides resources for building effective security programs, and details tech...

Mark as Played
May 7, 2025 11 mins

These sources discuss the growing integration of Large Language Models (LLMs) into cybersecurity, exploring both their benefits and associated risks. They highlight how LLMs can enhance threat detection, automate security tasks, and improve various defensive strategies. Simultaneously, the texts address the significant security challenges introduced by LLMs, including vulnerabilities like prompt injection, training data poisoning, ...

Mark as Played

This security-focused publication covers various recent cyberattacks and vulnerabilities, including breaches affecting Kelly Benefits and TeleMessage, along with a hack targeting an airline used for deportations. It also presents strategies and tactics like fuzzing and Kubernetes security policies. Furthermore, the source announces new security products and tools, such as a digital risk protection service and a DNS firewall. Finall...

Mark as Played

These sources collectively describe the Enterprise Browser, a new type of web browser designed for businesses. It offers enhanced security, control, and manageability compared to consumer browsers, which are not equipped for the complexities of corporate use and modern threats. Enterprise Browsers provide features like granular policy enforcement, data protection, centralized management, and seamless integration with existing enter...

Mark as Played

These sources provide an overview of Amazon WorkSpaces, a managed cloud service offering virtual desktops, highlighting its comparison with Azure Virtual Desktop in terms of features and limitations, particularly concerning Microsoft 365 Apps licensing and graphics performance. They discuss WorkSpaces pricing models, including hourly and monthly billing options and factors that influence cost like compute type and storage, and also...

Mark as Played

These sources primarily discuss LangChain's tools for interacting with SQL databases, focusing on the SQL Agent and SQL Database Chain. The LangChain SQL Agent offers a flexible method for querying databases, capable of understanding schemas, recovering from errors, and handling complex questions requiring multiple queries. It can be enhanced with dynamic few-shot prompting for better query generation and custom retriever tools to ...

Mark as Played
May 1, 2025 12 mins

This compilation of articles from TLDR covers various technology and business topics. Several pieces discuss developments in artificial intelligence (AI), including Google's potential integration with iPhones, Sam Altman's Worldcoin project's verification device, and the deployment of an AI-controlled robot for solar panel installation. Other articles address significant news regarding large technology companies, such as Tesla's CE...

Mark as Played

The podcast introduces Urban Laureate, a Dominican-American poet and artist from Queens. It explores his work, including the tracks “The Interview” and “Shine Now”, discussing the meaning behind his name and the influence of his Dominican heritage and urban upbringing. The text highlights how his music bridges cultural divides and shares stories that reflect lived experiences, resilience, and the pursuit of personal growth. Ultimat...

Mark as Played

This compilation of articles discusses several developments in the tech world, including Meta's launch of a new AI application and API access for its AI models, a partnership between Waymo and Toyota to explore integrating self-driving technology into personal vehicles, and Tesla's impact on the solar inverter market with its Powerwall 3. It also touches on Intel's upcoming chip technology, the strained relationship between OpenAI ...

Mark as Played

These sources collectively address the issue of fraud and theft affecting EBT (SNAP) benefits. They highlight that while card skimming is a significant method used by criminals to steal card information and PINs, some sources suggest data hacking or other online operations may also be contributing to the widespread theft. The texts emphasize the devastating impact this fraud has on individuals and families who depend on these benef...

Mark as Played

These sources discuss cybersecurity audits, providing guidance and frameworks for organizations to assess and improve their security posture. The U.S. Government Accountability Office (GAO) offers a detailed Cybersecurity Program Audit Guide outlining a systematic process for conducting audits, including steps for planning, performing, and reporting on the assessment of key cybersecurity program components. The National Institute o...

Mark as Played

Several articles discuss AWS (Amazon Web Services) security, highlighting common vulnerabilities like misconfigured storage and insecure APIs. The sources emphasize the importance of implementing security best practices within AWS, such as strong Identity and Access Management (IAM), comprehensive logging, and regular security assessments. A technical deep-dive is provided into AWS Security Groups vs. NACLs (Network Access Control ...

Mark as Played
April 29, 2025 10 mins

This compilation of articles highlights several notable developments in the tech and science sectors, covering topics such as OpenAI's integration of shopping features into ChatGPT, Amazon's advancement in satellite internet technology with Project Kuiper, and the emergence of 3D-printed construction, exemplified by a new Starbucks location. Further points of interest include laboratory-grown teeth, discussions on testing framework...

Mark as Played

This collection of cybersecurity news highlights critical vulnerabilities and emerging threats. It details a universal bypass technique called "Policy Puppetry" affecting major AI models and flaws in Planet Technology industrial switches and SAP Netweaver software that could lead to system takeover. The newsletter also covers exploitation tactics like Cross-Site WebSocket Hijacking and the use of AI in analyzing cyber incidents and...

Mark as Played

These sources discuss Signaling System No. 7 (SS7), a crucial set of protocols for establishing and managing telephone calls and other services on global networks. The GSMA report highlights significant security vulnerabilities within SS7 networks, detailing various attack methods like subscriber tracking, call interception, and fraud, and assesses the effectiveness of current protection measures. The CS-Rutgers material provides a...

Mark as Played

This document, "A Researcher's Guide to Some Legal Risks of Security Research," created through a collaboration between Harvard Law School's Cyberlaw Clinic and the Electronic Frontier Foundation (EFF), informs non-lawyer security researchers about potential U.S. legal liabilities they might encounter. It outlines various federal laws, including the CFAA, copyright law, the DMCA, contract law, trade secret law, the ECPA, and export...

Mark as Played

TLDR's recent newsletter covers a range of technology and science news. It highlights Tesla's employee testing of its autonomous ride-hailing service and Google's significant growth in Gemini usage. The newsletter also reports on scientists potentially discovering a new color and AI outperforming virologists in lab settings. Furthermore, it discusses data storage best practices, OpenAI's upgraded image generation API, and reflectio...

Mark as Played


Multiple sources discuss User and Entity Behavior Analytics (UEBA), a cybersecurity technology that analyzes user and entity behavior to detect anomalies indicating potential threats, contrasting it with Security Information and Event Management (SIEM) systems which primarily aggregate and analyze security event logs. The articles highlight that UEBA and SIEM are often complementary, offering enhanced threat detection, faster i...

Mark as Played

Popular Podcasts

    In 1997, actress Kristin Davis’ life was forever changed when she took on the role of Charlotte York in Sex and the City. As we watched Carrie, Samantha, Miranda and Charlotte navigate relationships in NYC, the show helped push once unacceptable conversation topics out of the shadows and altered the narrative around women and sex. We all saw ourselves in them as they searched for fulfillment in life, sex and friendships. Now, Kristin Davis wants to connect with you, the fans, and share untold stories and all the behind the scenes. Together, with Kristin and special guests, what will begin with Sex and the City will evolve into talks about themes that are still so relevant today. "Are you a Charlotte?" is much more than just rewatching this beloved show, it brings the past and the present together as we talk with heart, humor and of course some optimism.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Good Hang with Amy Poehler

    Come hang with Amy Poehler. Each week on her podcast, she'll welcome celebrities and fun people to her studio. They'll share stories about their careers, mutual friends, shared enthusiasms, and most importantly, what's been making them laugh. This podcast is not about trying to make you better or giving advice. Amy just wants to have a good time.

    The Clay Travis and Buck Sexton Show

    The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.