Decoding CyberSecurity
Rakesh Nayam
Welcome to Decoding CyberSecurity – the podcast that simplifies the complex world of cybersecurity. Hosted by an experienced Information Security Engineer with certifications like CISSP and CISM, each episode dives into essential topics, career advice, and real-world insights to help you break into and excel in cybersecurity. Whether you're just starting out, studying for certifications like Security+, or aiming for advanced credentials, we’re here to guide you. Join us every week as we uncover the skills, news, and tips you need to stay ahead in the field!
Categoria: Tecnologia
Ascolta l'ultimo episodio:
A 13-year-old from Australia slipped past Apple’s defenses—twice. Not fiction. Not clickbait. This is how identity, trust, and tiny misconfigs turn into a breach… and what defenders can do tomorrow morning.🎯 What you’ll learn• How forged trust beats firewalls • How exfil looks like “normal dev traffic”• Why stale service tokens are landmines • 7 controls to close the gap⏱️ Chapters00:00 – Teaser Cut (You don't want to skip this)02:14 – Chapter 1: The Job Dream – The First Spark03:20 – Chapter 2: The False Employee – The Door That Shouldn’t Exist04:14 – 🎯 Trivia Challenge04:46 – Chapter 3: The 90-Gig Haul – The Quiet Storm06:22 – Chapter 4: The Investigators – The Hunt in the Wires07:24 – Chapter 5: The Courtroom – The Gavel and the Gift08:36 – Chapter 6: The Autopsy – How the Keys Were Forged09:20 – Chapter 7: Cyber Pro Breakdown – What To Do Tomorrow Morning12:23 – Chapter 8: Closing Montage – The Human Line🧠 Cyber Pro POV (checklist)Rotate/inventory service keys • Kill non-prod → prod trust • Instrument identity signals • Monitor outbound “shape,” not size • Honey tokens & canaries • Time-boxed elevations • Student/bug-bounty paths👉 If this helped, subscribe and binge the playlist on true cyber incidents.🔗 Watch next: • Real Cyber Attacks & How They Happened 🕵️♂️ 📌 Sources & disclaimers: based on public reporting; dramatized responsibly for education.https://portswigger.net/daily-swig/ha...https://www.abc.net.au/news/2019-05-2...https://www.welivesecurity.com/2018/0...https://www.theverge.com/2018/8/16/17...https://www.reuters.com/article/world...This video is for educational purposes only#cybersecurity #hackingstory #apple #TrueCrimeTech #infosec #decodingcybersecurity #cyberawareness #cybercrime #tech #digitalsafety #techtips #Cyberpro #australia #ASIO #ASIS #ASD #Security #intelligence #AustralianSecretIntelligenceService #AustralianSecurityIntelligenceOrganisation #AustralianSignalsDirectorate #DepartmentofHomeAffairs #AustralianFederalPolice #applehacks #iOS #technology #CyberStory #cyber #RealHacks #RealLessons #realstories #CyberTrends #futureofsecurity #Privacy #decodingcybersecurity #techpodcast #socialengineering
Episodi precedenti
-
32 - Australian Schoolboy vs Apple — 90GB, Backdoors… and a Twist #HackingStory #Apple #TrueCrimeTech Thu, 06 Nov 2025
-
31 - AI Is Not Neutral. Here’s the Culture It’s Pushing #ai #experiment #havard #chatgpt #InsideChatGPT Wed, 12 Nov 2025
-
30 - Your Smart TV Is Watching You: A Hacker’s True Story | @DecodingCyberSecurity1920  Wed, 22 Oct 2025
-
29 - The Airport Hack That Grounded Europe: A True Cybercrime Thriller #decodingcybersecurity Tue, 07 Oct 2025
-
28 - Fake Websites: How Scammers Clone Brands & Steal Your Money Mon, 29 Sep 2025
-
27 - $170,000 Lost in a Fake VIP Trading Group — How Fear Sealed the Trap Tue, 23 Sep 2025
-
26 - Digital Arrest Scam: How Fear Trapped Her and ₹58 Million Was Stolen Tue, 16 Sep 2025
-
25 - Pegasus Spyware: The World’s Most Terrifying Hack That Turns Silence Into Surveillance #pegasus Tue, 09 Sep 2025
-
24 - They Had a Plan. Then the Hackers Launched a Second Cyber Attack #SOC #incidentresponse Mon, 28 Jul 2025
-
23 - How a Smartwatch Nearly Ruined His Career — And the Shocking Truth Behind It Mon, 07 Jul 2025
-
22 - Bengaluru Engineer Loses ₹700,000 in LinkedIn Job Scam and then...? Wed, 18 Jun 2025
-
21 - Hyderabad Techie Loses ₹4.2 Million After WhatsApp Gets Hijacked 😱 Mon, 02 Jun 2025
-
20 - How Hackers Are Weaponizing ChatGPT — And How You Can Fight Back Mon, 19 May 2025
-
19 - It Was 2:15 AM. The SOC Team Realized the Hacker Was Already Inside… Thu, 08 May 2025
-
18 - How a Missed Patch Became a $1.4 Billion Mistake Thu, 24 Apr 2025
-
17 - Behind the Hack - The Untold story of Incident Response Tue, 15 Apr 2025
-
16 - The Shocking Truth About AI Errors! Tue, 25 Mar 2025
-
15 - ByBit Hack - Biggest Hack in Crypto History? Tue, 11 Mar 2025
-
14 - Decoding 'Zero Day' - NETFLIX Political Cyber Thriller Fri, 28 Feb 2025
-
13 - Part 2 - Crime in the Digital Age Fri, 14 Feb 2025
-
12 - Inside the Criminal Mind: How Criminals Think and Why It Matters Fri, 07 Feb 2025
-
11 - DeepSeek: The Open-Source AI That’s Changing the Rules of the Game  Fri, 31 Jan 2025
-
10 - What Does Jeff’s Phone Think About His Home? The Strange Alert He Received That Night… Fri, 10 Jan 2025
-
9 - Was it the Real Rakesh and Jeff... or Just Deepfakes? 🤖 - Part 2 Fri, 03 Jan 2025
-
8 - 𝗙𝗿𝗼𝗺 𝗪𝗮𝗿𝗲𝗵𝗼𝘂𝘀𝗲 𝗪𝗼𝗿𝗸 𝘁𝗼 𝗖𝗧𝗢: 𝙇𝙚𝙖𝙙𝙞𝙣𝙜 𝙩𝙝𝙚 𝙁𝙪𝙩𝙪𝙧𝙚 𝙤𝙛 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 Thu, 26 Dec 2024
-
7 - Podwith with Jeff - Careers in CyberSecurity - Always in Demand Tue, 24 Dec 2024
-
6 - Cyber Threats & Vulnerabilities - Understanding the Invisible Villains Sun, 08 Dec 2024
-
5 - Cybersecurity in Daily Life - Simple Steps to Stay Safe in a Digital World Sun, 01 Dec 2024
-
4 - AI in Cybersecurity – Defense, Threats, and the Future of Security Sun, 24 Nov 2024
-
3 - Certification Paths – Choosing Between Security+, CISSP, CISM, and OSCP Sun, 17 Nov 2024
-
2 - Understanding Security Frameworks Sun, 10 Nov 2024
-
1 - Breaking into Cybersecurity – Skills, Learning Resources, and Certifications Fri, 01 Nov 2024