Tools that automate the identification and remediation of cloud misconfigurations.
CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management
Audio reference link: …
An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordo…
A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.
CyberWire Glossary link: https://thecyberwire.com/glossary/si…
From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90%…
From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hac…
An authentication process that requires two different factors before granting access.
CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication
Learn more about your ad cho…
From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive i…
A cloud based sensitive information management system that allows users access across multiple devices.
CyberWire Glossary link: https://thecyberwire.com/glossary/icloud-keychain
Audio reference link…
A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy design…
1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless a…
A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyo…
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the a…
Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.
CyberWire Glossary link: https://thecyberwire.com/glossary/spam
Audio refe…
A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity…
The act of searching through an organization's trash for discarded sensitive material.
CyberWire Glossary link: https://thecyberwire.com/glossary/dumpster-diving
Audio reference link: “Better Call S…
The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.
CyberWire Glossary link: https://thecyberwire.com/glossary/search-engine-optimization-poisoni…
The practice of crafting a fake online persona for malicious purposes.
CyberWire Glossary link: https://thecyberwire.com/glossary/catfish
Audio reference link: netbunny, 2013. Catfish - The Movie - E…
A passwordless authentication protocol based on the FIDO2 standard.
CyberWire Glossary link: https://thecyberwire.com/glossary/passkey
Audio reference link: Summers, J., 2023. Google Passkeys Have Ar…
A type of phishing attack that uses QR codes as the lure.
CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing
Audio reference link: KNR, 2018. Batman The Dark Knight Joker bom…
Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.
Definition two: Determining the responsibility for offensive cyber operations.
CyberWire Glossa…
00:09:24 |
Tue 09 May 2023
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.