Monthly Threat Report March 2025
Security Lab
Monthly Threat Report March 2025
1:34
Top Industries Under Cyber Attack
Security Lab
Top Industries Under Cyber Attack
0:54
Email Threat Trends Revealed
Security Lab
Email Threat Trends Revealed
0:49
What is the State of Ransomware in 2024 (FULL EP) | Security Swarm Podcast
Security Lab
What is the State of Ransomware in 2024 (FULL EP) | Security Swarm Podcast
44:05
Stop Predictable Passwords!
Security Lab
Stop Predictable Passwords!
0:59
Password Length Matters!
Security Lab
Password Length Matters!
0:55
The Tech Industry Has a Software Quality Issue (FULL EP) | Security Swarm Podcast
Security Lab
The Tech Industry Has a Software Quality Issue (FULL EP) | Security Swarm Podcast
39:08
Security of the Windows Boot Process (FULL EP) | Security Swarm Podcast
Security Lab
Security of the Windows Boot Process (FULL EP) | Security Swarm Podcast
35:17
The Psychology of Cybercrime (FULL EP) | Security Swarm Podcast
Security Lab
The Psychology of Cybercrime (FULL EP) | Security Swarm Podcast
41:55
How Threat Actors Use Copilot (FULL EP) | Security Swarm Podcast
Security Lab
How Threat Actors Use Copilot (FULL EP) | Security Swarm Podcast
39:50
Monthly Threat Report October 2024
Security Lab
Monthly Threat Report October 2024
2:07
CrowdStrike Saga Continues, CUPS Vulnerability and More (FULL EP) | Security Swarm Podcast
Security Lab
CrowdStrike Saga Continues, CUPS Vulnerability and More (FULL EP) | Security Swarm Podcast
49:02
New Password Requirements from NIST (FULL EP) | Security Swarm Podcast
Security Lab
New Password Requirements from NIST (FULL EP) | Security Swarm Podcast
36:12
Understanding the Dangers of Identity Theft in Tax Fraud
Security Lab
Understanding the Dangers of Identity Theft in Tax Fraud
0:56
Gift Card Fraud
Security Lab
Gift Card Fraud
0:57
Tax Fraud Spear Phishing
Security Lab
Tax Fraud Spear Phishing
1:01
Initial Contact Fraud
Security Lab
Initial Contact Fraud
0:58
Top Spear Phishing Methods (FULL EP) | Security Swarm Podcast
Security Lab
Top Spear Phishing Methods (FULL EP) | Security Swarm Podcast
34:19
The Rise of Rogue Admins
Security Lab
The Rise of Rogue Admins
0:59
The Dangers of Data Brokers
Security Lab
The Dangers of Data Brokers
0:53
Data Broker Breaches - Insider Threats and More (FULL EP) | Security Swarm Podcast
Security Lab
Data Broker Breaches - Insider Threats and More (FULL EP) | Security Swarm Podcast
40:27
The Value of Third-Party Security Solutions
Security Lab
The Value of Third-Party Security Solutions
0:52
Microsoft's Naming Nightmare
Security Lab
Microsoft's Naming Nightmare
0:57
Monthly Threat Report September 2024
Security Lab
Monthly Threat Report September 2024
1:48
Why Email Security Is Like a Marathon Runner's Journey
Security Lab
Why Email Security Is Like a Marathon Runner's Journey
0:58
How SPF, DKIM, and DMARC Work Together to Fight Spam
Security Lab
How SPF, DKIM, and DMARC Work Together to Fight Spam
0:59
The Complexity and Confusion of the Defender Ecosystem (FULL EP) | Security Swarm Podcast
Security Lab
The Complexity and Confusion of the Defender Ecosystem (FULL EP) | Security Swarm Podcast
40:34
The Need for Effective Patching
Security Lab
The Need for Effective Patching
0:58
Public SSN Risks: Data Management Issues
Security Lab
Public SSN Risks: Data Management Issues
0:42
Unsecured Devices
Security Lab
Unsecured Devices
1:00
Hacking the Bundestag
Security Lab
Hacking the Bundestag
0:57
Election Tampering
Security Lab
Election Tampering
0:54
The Magic Behind DMARC, DKIM, and SPF? (FULL EP) | Security Swarm Podcast
Security Lab
The Magic Behind DMARC, DKIM, and SPF? (FULL EP) | Security Swarm Podcast
27:39
Egregious Security Practices in the Workplace (FULL EP) | Security Swarm Podcast
Security Lab
Egregious Security Practices in the Workplace (FULL EP) | Security Swarm Podcast
52:53
How Threat Actors Tamper with Elections (FULL EP) | Security Swarm Podcast
Security Lab
How Threat Actors Tamper with Elections (FULL EP) | Security Swarm Podcast
36:09
Critical VMware ESXi Vulnerability Exposes Entire Host to Ransomware Attacks
Security Lab
Critical VMware ESXi Vulnerability Exposes Entire Host to Ransomware Attacks
0:58
Challenges of Preventing Jailbreak Attacks on LLMs
Security Lab
Challenges of Preventing Jailbreak Attacks on LLMs
0:58
CrowdStrike Chaos, VMware ESXi Vulnerability & More (FULL EP) | Security Swarm Podcast
Security Lab
CrowdStrike Chaos, VMware ESXi Vulnerability & More (FULL EP) | Security Swarm Podcast
46:14
Monthly Threat Report August 2024
Security Lab
Monthly Threat Report August 2024
2:10
How to Insulate your Business from Vendor Risk (FULL EP) | Security Swarm Podcast
Security Lab
How to Insulate your Business from Vendor Risk (FULL EP) | Security Swarm Podcast
35:42
Who is Anonymous Sudan?
Security Lab
Who is Anonymous Sudan?
0:59
Is Anonymous Sudan Tied to Russia?
Security Lab
Is Anonymous Sudan Tied to Russia?
1:00
Inside Anonymous Sudan: Group Behind Major Cyber Attacks (FULL EP) Security Swarm Podcast
Security Lab
Inside Anonymous Sudan: Group Behind Major Cyber Attacks (FULL EP) Security Swarm Podcast
30:08
Why Confidential Computing Matters (FULL EP) | Security Swarm Podcast
Security Lab
Why Confidential Computing Matters (FULL EP) | Security Swarm Podcast
35:29
The Hidden Costs of Prioritizing Features Over Security at Microsoft: Insights from ProPublica
Security Lab
The Hidden Costs of Prioritizing Features Over Security at Microsoft: Insights from ProPublica
2:17
Microsoft Whistleblower Exposes Security Vulnerabilities
Security Lab
Microsoft Whistleblower Exposes Security Vulnerabilities
1:00
Microsoft’s Security Saga Continues: Insights from Whistleblower (FULL EP) | Security Swarm Podcast
Security Lab
Microsoft’s Security Saga Continues: Insights from Whistleblower (FULL EP) | Security Swarm Podcast
35:42
Tips & Tricks for Starting a Career in Cybersecurity (FULL EP) | Security Swarm Podcast
Security Lab
Tips & Tricks for Starting a Career in Cybersecurity (FULL EP) | Security Swarm Podcast
43:40
Threat Actors Take Advantage of Global Attention on the Olympics
Security Lab
Threat Actors Take Advantage of Global Attention on the Olympics
0:53
Summer Olympics 2024: How and Why Threat Actors Target the Games (FULL EP) | Security Swarm Podcast
Security Lab
Summer Olympics 2024: How and Why Threat Actors Target the Games (FULL EP) | Security Swarm Podcast
30:00
Understanding the Cybersecurity Concerns of The Upcoming Olympics
Security Lab
Understanding the Cybersecurity Concerns of The Upcoming Olympics
3:46
Celebrating 50 Episodes: Review of our Top Security Discussions (PT2) | Security Swarm Podcast
Security Lab
Celebrating 50 Episodes: Review of our Top Security Discussions (PT2) | Security Swarm Podcast
32:54
Celebrating 50 Episodes: Review of our Top Security Discussions (FULL EP) | Security Swarm Podcast
Security Lab
Celebrating 50 Episodes: Review of our Top Security Discussions (FULL EP) | Security Swarm Podcast
31:12
Threat Actors Use OSINT to Launch Targeted Deep Fake Attacks
Security Lab
Threat Actors Use OSINT to Launch Targeted Deep Fake Attacks
0:57
BEC Attacks Leverage Open-Source Intelligence (OSINT)
Security Lab
BEC Attacks Leverage Open-Source Intelligence (OSINT)
0:50
Powerful Telegram Bot Exposes Personal Data
Security Lab
Powerful Telegram Bot Exposes Personal Data
0:53
The Darker Side of OSINT (Open-Source Intelligence)
Security Lab
The Darker Side of OSINT (Open-Source Intelligence)
3:38
OSINT in The Hands of Hackers (FULL EP) | Security Swarm Podcast
Security Lab
OSINT in The Hands of Hackers (FULL EP) | Security Swarm Podcast
32:59
Large Botnet Taken Down by Authorities
Security Lab
Large Botnet Taken Down by Authorities
0:41
Security Implications of Migrating from VMware (FULL EP) | Security Swarm Podcast
Security Lab
Security Implications of Migrating from VMware (FULL EP) | Security Swarm Podcast
46:59
The 911 S5 Botnet Explained
Security Lab
The 911 S5 Botnet Explained
0:55
DarkGate Malware Campaign Using Pastejacking
Security Lab
DarkGate Malware Campaign Using Pastejacking
0:58
How a Cybercriminal Exploited 19 Million IPs for Child Exploitation, Identity Theft & More
Security Lab
How a Cybercriminal Exploited 19 Million IPs for Child Exploitation, Identity Theft & More
4:15
Threat Campaign Distributing DarkGate Malware & The 911 S5 Botnet Takedown | Security Swarm Podcast
Security Lab
Threat Campaign Distributing DarkGate Malware & The 911 S5 Botnet Takedown | Security Swarm Podcast
38:40
Monthly Threat Report - June 2024
Security Lab
Monthly Threat Report - June 2024
1:10
The Security Swarm Podcast - Trailer
Security Lab
The Security Swarm Podcast - Trailer
0:34
Are Passkeys User-Friendly?
Security Lab
Are Passkeys User-Friendly?
2:14
How to Maximize Security When Using Passkeys
Security Lab
How to Maximize Security When Using Passkeys
0:58
How to Prepare for Passkeys in Microsoft 365
Security Lab
How to Prepare for Passkeys in Microsoft 365
0:56
Windows Server 2025: New Security Features Revealed (FULL EP) | Security Swarm Podcast
Security Lab
Windows Server 2025: New Security Features Revealed (FULL EP) | Security Swarm Podcast
46:14
Exploring the Security Benefits of Syncable Passkeys with Jan Bakker
Security Lab
Exploring the Security Benefits of Syncable Passkeys with Jan Bakker
2:48
Passkeys vs Traditional Passwords: Which is More Secure?
Security Lab
Passkeys vs Traditional Passwords: Which is More Secure?
0:56
Microsoft's Plan to Reduce the Risk of Unauthorized Access
Security Lab
Microsoft's Plan to Reduce the Risk of Unauthorized Access
0:55
Passkeys in Microsoft Entra: Benefits, Implementation Tips & More (FULL EP) | Security Swarm Podcast
Security Lab
Passkeys in Microsoft Entra: Benefits, Implementation Tips & More (FULL EP) | Security Swarm Podcast
35:16
What Does Microsoft's SFI Expansion Promise?
Security Lab
What Does Microsoft's SFI Expansion Promise?
0:57
Microsoft's SFI Expansion Plans
Security Lab
Microsoft's SFI Expansion Plans
3:20
Did the CSRB Force Microsoft's Hand on Security? (FULL EP) | Security Swarm Podcast
Security Lab
Did the CSRB Force Microsoft's Hand on Security? (FULL EP) | Security Swarm Podcast
47:32
Change Healthcare Paid a $22 Million Ransom
Security Lab
Change Healthcare Paid a $22 Million Ransom
1:00
Which Organizations Will Be Impacted by the PSTI Law in the UK?
Security Lab
Which Organizations Will Be Impacted by the PSTI Law in the UK?
1:00
PSTI Act for Consumer IoT
Security Lab
PSTI Act for Consumer IoT
0:59
Monthly Threat Report | May 2024
Security Lab
Monthly Threat Report | May 2024
1:39
Microsoft's Commitment to Prioritize Security Following CSRB's Report
Security Lab
Microsoft's Commitment to Prioritize Security Following CSRB's Report
0:54
Microsoft's SFI Expansion, UK's PSTI Law, Change Healthcare Attack (FULL EP)| Security Swarm Podcast
Security Lab
Microsoft's SFI Expansion, UK's PSTI Law, Change Healthcare Attack (FULL EP)| Security Swarm Podcast
45:08
Monthly Threat Report - April 24
Security Lab
Monthly Threat Report - April 24
0:31