ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Weak passwords meet strong motives

Автор: N2K Networks

Загружено: 2025-12-11

Просмотров: 306

Описание: CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor.  Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding & building resilience against identity-driven threats. A malware tutor gets schooled by the law.



Remember to leave us a 5-star rating and review in your favorite podcast app.



Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing (https://thecyberwire.com/newsletters/...) , and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn (  / posts  ) .



CyberWire Guest



On today’s Industry Voices segment, we are joined by Kavitha Mariappan (  / kmariappan  ) , Chief Transformation Officer at Knowledge Partner Rubrik (https://www.rubrik.com/) , talking about understanding and building resilience against identity-driven threats. Tune into Kavitha’s full conversation here (https://explore.thecyberwire.com/rubrik) . 




•


New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (https://www.rubrik.com/company/newsro...) (Press release)




•


The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (https://zerolabs.rubrik.com/reports/t...) (Report) 




•


Agentic AI and Identity Sprawl (https://www.thecyberwire.com/podcasts...) (Data Security Decoded podcast episode) Host Caleb Tolin and guest ⁠Joe Hladik⁠, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. 






Resources: Rubrik’s Data Security Decoded (https://www.thecyberwire.com/podcasts...) podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app.



Selected Reading



CISA: Pro-Russia Hacktivists Target US Critical Infrastructure (https://www.darkreading.com/threat-in...)



New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop (https://cyberscoop.com/ai-cybersecuri...)



Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine (https://www.infosecurity-magazine.com...)



North Korea-linked ‘EtherRAT’ backdoor used in React2Shell attacks | SC Media (https://www.scworld.com/news/north-ko...)



Thousands of Exposed Secrets Found on Docker Hub - Flare (https://flare.io/learn/resources/dock...)



Hackers exploit unpatched Gogs zero-day to breach 700 servers (https://www.bleepingcomputer.com/news...)



IBM Patches Over 100 Vulnerabilities - SecurityWeek (https://www.securityweek.com/ibm-patc...)



Ransomware IAB abuses EDR for stealthy malware execution (https://www.bleepingcomputer.com/news...)



US charges former Accenture employee with misleading feds on cloud platform’s security - Nextgov/FCW (https://www.nextgov.com/cybersecurity...)



Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA (https://www.channelnewsasia.com/singa...)



Share your feedback.



What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey (https://www.surveymonkey.com/r/NCFFCZJ) . Thank you for helping us continue to improve our show.



Want to hear your company in the show?



N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com (http://spon...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Weak passwords meet strong motives

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

One rule to rule them all.

One rule to rule them all.

Windows 11 Bitlocker не предназначен для вашей защиты

Windows 11 Bitlocker не предназначен для вашей защиты

Роналдо против моего непобедимого вратаря-робота

Роналдо против моего непобедимого вратаря-робота

Cybersecurity and Zero Trust

Cybersecurity and Zero Trust

Это вредоносное ПО? — Получение root-прав на SuperBox S6 Pro

Это вредоносное ПО? — Получение root-прав на SuperBox S6 Pro

The lies that let AI run amok. [Research Saturday]

The lies that let AI run amok. [Research Saturday]

Архитектура безопасности Zero Trust: пошаговое руководство для современных предприятий

Архитектура безопасности Zero Trust: пошаговое руководство для современных предприятий

Принц Персии: разбираем код гениальной игры, вытирая слезы счастья

Принц Персии: разбираем код гениальной игры, вытирая слезы счастья

Разработка с помощью Gemini 3, AI Studio, Antigravity и Nano Banana | Подкаст Agent Factory

Разработка с помощью Gemini 3, AI Studio, Antigravity и Nano Banana | Подкаст Agent Factory

Почему люди покупают НЕ те ноутбуки для хакинга

Почему люди покупают НЕ те ноутбуки для хакинга

Where encryption meets executive muscle.

Where encryption meets executive muscle.

There Is Something Faster Than Light

There Is Something Faster Than Light

Двухфакторная аутентификация (2FA). Афера века. Защитная стратегия.

Двухфакторная аутентификация (2FA). Афера века. Защитная стратегия.

Zero Trust — CompTIA Security+ SY0-701 — 1.2

Zero Trust — CompTIA Security+ SY0-701 — 1.2

AV Evasion: Часть 1 — (Evasive — взломайте Smarter Labs!)

AV Evasion: Часть 1 — (Evasive — взломайте Smarter Labs!)

The cloud that spies back.

The cloud that spies back.

OneView gives attackers the full tour.

OneView gives attackers the full tour.

Cyber lessons from the frontlines.

Cyber lessons from the frontlines.

From Presidential Decrees to Tumbling Satellites.

From Presidential Decrees to Tumbling Satellites.

Root access to the great firewall. [Research Saturday]

Root access to the great firewall. [Research Saturday]

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]