Decoded: The Cybersecurity Podcast cover art

Decoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

By: Edward Henriquez
Listen for free

About this listen

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.Edward Henriquez
Episodes
  • Gemini CLI: AI Agent for Coding Workflows
    Jun 26 2025

    Gemini CLI, an open-source AI agent developed by Google that integrates the Gemini 2.5 Pro model directly into the terminal for coding and automation tasks. Multiple sources highlight its generous free tier, offering high usage limits without charge, which is seen as a competitive move against similar paid tools like Claude Code. While the free tier might involve data collection for model improvement, users can opt for a paid API key to prevent this and potentially gain higher capacities. The articles detail how to set up Gemini CLI, either directly through Google Cloud/AI Studio API keys or via OpenRouter integrations, and mention its utility in various development environments like VS Code, as well as its capabilities for tasks such as debugging, generating code, and automating workflows.


    Show More Show Less
    15 mins
  • Chromium Browser Screen Spying Techniques
    Jun 24 2025

    The provided text from mrd0x.com describes a method for covertly capturing screenshots from a user's computer using Chromium-based web browsers like Chrome or Edge. It explains how a specific command-line flag, --auto-select-desktop-capture-source=Entire, can bypass the typical user prompt for screen sharing, allowing a malicious webpage to automatically access and capture the entire screen. The article details the JavaScript and PHP code required to take screenshots, convert them to images, and upload them to a remote server. Furthermore, it explores options for hiding the browser window by running it in headless mode or positioning it off-screen to facilitate continuous, unnoticed monitoring of user activity for post-exploitation reconnaissance.


    Show More Show Less
    10 mins
  • Bug Bounty Programs and Vulnerability Rewards
    Jun 24 2025

    The provided sources offer insight into the world of cybersecurity, specifically focusing on vulnerability discovery and remediation. Google's security blogs highlight their Vulnerability Reward Programs (VRPs), detailing increased payouts for critical findings in Android, Chrome, and Cloud services, and recognizing top researchers. This proactive approach to security involves incentivizing external researchers to find and report bugs. Conversely, a Reddit discussion from the bug bounty community reveals the challenges and high skill level required to succeed in these programs, often noting that highly mature applications have fewer easily discoverable vulnerabilities. Additionally, the CISA Known Exploited Vulnerabilities Catalog serves as an official government resource, listing vulnerabilities actively being exploited in the wild, providing a critical tool for organizations to prioritize their security efforts.

    Show More Show Less
    15 mins

What listeners say about Decoded: The Cybersecurity Podcast

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.