Decoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.

Episodes

August 21, 2025 13 mins

A comprehensive overview of current cybersecurity issues, highlighting both active threats and proactive defense strategies. Several articles detail recent attacks, such as the exploitation of an Apache ActiveMQ flaw, the compromise of Microsoft logins through ADFS redirects, and the DripDropper malware, underscoring the constant evolution of attacker tactics. In response, the sources emphasize strategic shifts like adopting Detect...

Mark as Played

This source is an in-depth security blog post from Morphisec, a cybersecurity company, detailing the evolution of the Noodlophile Stealer. It describes how this malware now employs sophisticated spear-phishing attacks disguised as copyright infringement notices, specifically targeting enterprises with a strong social media presence, especially on Facebook. The article explains the malware's delivery mechanisms, which exploit legiti...

Mark as Played

These sources collectively provide a comprehensive look at the multifaceted phenomenon of smuggling, examining its historical context, economic drivers, and societal impacts across various regions. The "Routledge Handbook of Smuggling" serves as the primary and most extensive source, exploring different types of illicit trade—from petroleum and arms to wildlife and human smuggling—and their complex relationship with state authority...

Mark as Played

The provided texts discuss cybersecurity vulnerabilities and solutions, with a particular focus on Fortinet's FortiSIEM platform and authentication vulnerabilities in general. Several sources detail critical remote code execution (RCE) flaws in FortiSIEM, highlighting their unauthenticated nature and active exploitation, urging immediate patching or workarounds. One source outlines eleven common authentication vulnerabilities, expl...

Mark as Played

The provided texts collectively address the Model Context Protocol (MCP), an open standard designed to enable AI agents to interact with external tools and services. Multiple sources highlight significant security vulnerabilities within MCP implementations, including issues like OAuth discovery flaws, command injection, unrestricted network access, tool poisoning attacks, and secret exposure. Discussions also cover confused deputy ...

Mark as Played

The source consists of an Ask Me Anything (AMA) session on Reddit with OpenAI's CEO, Sam Altman, and members of the GPT-5 team, focusing on the release of GPT-5. The discussion highlights user frustrations regarding the removal of older, popular models like GPT-4o and 4.1, which users often preferred for their personality, creativity, and nuanced conversational abilities. Many users express feeling that GPT-5 is a downgrade in term...

Mark as Played

The provided sources collectively address the escalating threat of phishing attacks targeting Microsoft 365 users, specifically highlighting the exploitation of link wrapping services like Proofpoint and Intermedia to bypass traditional security measures. These malicious campaigns leverage techniques such as URL manipulation and social engineering to trick users into granting unauthorized access or revealing credentials, often thro...

Mark as Played

The MaxDcb Blog discusses DreamWalkers, a novel shellcode loader that creates clean and believable call stacks, even for reflectively loaded modules. The author was inspired by Donut and MemoryModule to build a position-independent shellcode loader, implementing features like command-line argument passing and a unique approach to .NET (CLR) payload support using an intermediate DLL. The core innovation of DreamWalkers lies in its a...

Mark as Played

This document, titled "CraxsRAT: Android Remote Access malware strikes in Malaysia," is a malware analysis report published by Group-IB, a cybersecurity company. It focuses on the CraxsRAT Android malware family, detailing its capabilities, attack flow, impact on victims and organizations, and detection/prevention methods. The report also provides Indicators of Compromise (IOCs), including a comprehensive list of known malware samp...

Mark as Played

The provided sources outline a comprehensive, step-by-step approach to conducting an AI risk assessment, emphasizing its importance for organizational protection and trust-building. They detail a nine-step process, starting with defining the AI system and mapping data sources, then moving to identifying and assessing potential risks like bias, privacy violations, and security vulnerabilities. The process also includes documenting e...

Mark as Played

"AI Revolution" announces the launch of ChatGPT Agent, an advanced AI that can perform complex, multi-step tasks across a virtual computer environment. This new capability allows it to browse the web, interact with applications like Gmail and GitHub, edit spreadsheets, and generate presentations by integrating various tools such as text and visual browsers, a terminal, and API connectors. The video highlights impressive performance...

Mark as Played
July 14, 2025 17 mins

The provided sources discuss AI operating systems (AI OS), a new frontier in computing designed to automate complex tasks and streamline human-AI interaction. Warmwind, a notable example, is highlighted as an AI-driven cloud-based OS that uses agents to interact with software interfaces like a human, removing the need for traditional coding or APIs. This system aims to create "cloud employees" that can perform repetitive business t...

Mark as Played

The provided text introduces Retriever AI, a new AI agent designed to automate web-based tasks directly from the user's browser, eliminating the need for cloud servers. This innovative tool distinguishes itself by interacting directly with the Document Object Model (DOM) of web pages, allowing for highly accurate and efficient data extraction, form filling, and navigation, unlike other agents that rely on screenshots or computer vi...

Mark as Played

The provided sources discuss Microsoft's July 2025 Patch Tuesday, a significant security update addressing numerous vulnerabilities across its products. These releases typically detail the number and severity of flaws, highlighting critical remote code execution (RCE) vulnerabilities in areas like Microsoft Office, SharePoint, and Windows services, alongside information disclosure issues in SQL Server. While most sources confirm on...

Mark as Played

This podcast shares an extensive overview of recent breakthroughs and challenges in the Artificial Intelligence (AI) landscape. They highlight Google's advancements in multi-agent AI systems through its MASS framework, which optimizes collaborative AI teams, and OpenAI's release of the powerful 03 Pro model, alongside CEO Sam Altman's bold claims about superintelligence. The documents also reveal Meta's aggressive pursuit of superi...

Mark as Played

The provided sources offer a multi-faceted examination of Trump's "Big, Beautiful Bill," outlining its fiscal implications and proposed healthcare changes. The "AskTrumpSupporters" Reddit discussion reveals a range of opinions from supporters, focusing on tax cuts, gun control, and the deficit, while highlighting concerns about student loan caps affecting medical students. In contrast, the Senate Finance Committee's press release a...

Mark as Played

The provided sources collectively offer a comprehensive look into phishing attacks, defining them as attempts to steal sensitive information through deceptive means, often by impersonating legitimate entities. They highlight the increasing prevalence and sophistication of phishing, emphasizing the significant financial and reputational damage it can cause to both individuals and organizations. A key theme is the importance of phish...

Mark as Played

The provided sources offer a multifaceted view of TheFatRat, an entity that is both a German DJ and record producer, as well as a powerful, open-source ethical hacking tool designed for generating malware and backdoors across various operating systems, including Android. The academic paper "Access Android Device Using The FatRat and Metasploit" details how this tool, in conjunction with Metasploit, can exploit Android vulnerabiliti...

Mark as Played

Gemini CLI, an open-source AI agent developed by Google that integrates the Gemini 2.5 Pro model directly into the terminal for coding and automation tasks. Multiple sources highlight its generous free tier, offering high usage limits without charge, which is seen as a competitive move against similar paid tools like Claude Code. While the free tier might involve data collection for model improvement, users can opt for a paid API k...

Mark as Played

The provided text from mrd0x.com describes a method for covertly capturing screenshots from a user's computer using Chromium-based web browsers like Chrome or Edge. It explains how a specific command-line flag, --auto-select-desktop-capture-source=Entire, can bypass the typical user prompt for screen sharing, allowing a malicious webpage to automatically access and capture the entire screen. The article details the JavaScript and P...

Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

    NFL Daily with Gregg Rosenthal

    Gregg Rosenthal and a rotating crew of elite NFL Media co-hosts, including Patrick Claybon, Colleen Wolfe, Steve Wyche, Nick Shook and Jourdan Rodrigue of The Athletic get you caught up daily on all the NFL news and analysis you need to be smarter and funnier than your friends.

    The Bobby Bones Show

    Listen to 'The Bobby Bones Show' by downloading the daily full replay.

    New Heights with Jason & Travis Kelce

    Football’s funniest family duo — Jason Kelce of the Philadelphia Eagles and Travis Kelce of the Kansas City Chiefs — team up to provide next-level access to life in the league as it unfolds. The two brothers and Super Bowl champions drop weekly insights about the weekly slate of games and share their INSIDE perspectives on trending NFL news and sports headlines. They also endlessly rag on each other as brothers do, chat the latest in pop culture and welcome some very popular and well-known friends to chat with them. Check out new episodes every Wednesday. Follow New Heights on the Wondery App, YouTube or wherever you get your podcasts. You can listen to new episodes early and ad-free, and get exclusive content on Wondery+. Join Wondery+ in the Wondery App, Apple Podcasts or Spotify. And join our new membership for a unique fan experience by going to the New Heights YouTube channel now!

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.