Episodes

  • Microsoft May 2025 Patch Tuesday Update
    May 13 2025

    These sources collectively cover Microsoft's May 2025 Patch Tuesday, detailing the security updates released on May 13, 2025. Multiple articles highlight that these updates address a significant number of vulnerabilities, including several actively exploited zero-day flaws and others rated as critical. One source from Forbes specifically mentions a critical 10/10 cloud security vulnerability that has been confirmed and mitigated by Microsoft with no user action required, reflecting a move towards greater transparency in cloud vulnerability reporting. Another source from Netwrix Community notes that the May 13th updates can cause compatibility issues with certain Netwrix Threat Prevention agents on Windows Server versions, impacting the capture and blocking of specific authentication events. Finally, Microsoft's own support page lists the specific cumulative updates, like KB5058385 for Windows Server 2022 and KB5058411 for Windows 11 24H2, which contain these security fixes and some new features, such as AI-powered tools on Copilot+ PCs.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    21 mins
  • Cyber Threat Intelligence Resources and Trends
    May 13 2025

    These sources collectively discuss the evolving landscape of cyber threats, including the increasing complexity of attacks involving multiple threat actors and the challenges this presents for traditional analysis models. One source provides a comprehensive curated list of resources for threat intelligence, covering sources of information, analytical frameworks, and tools for investigating cyber threats. Another source explores the rise of zero-day exploits in 2024, noting a shift towards targeting enterprise security and networking products and highlighting the continued significant role of espionage actors. A third source introduces Immunity CANVAS, a commercial tool for penetration testing, breach simulation, and exploit development, emphasizing its utility for security professionals and researchers. The final source offers a national assessment of cyber threats, detailing the persistent dangers posed by state-sponsored actors and cybercriminals to critical infrastructure and national security.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    22 mins
  • Cybersecurity Attacks and Tactics
    May 8 2025

    InfoSec discusses several critical cybersecurity developments and strategies. It highlights the active exploitation of vulnerabilities in software like Langflow and WordPress plugins, and notes an increase in unsophisticated attacks targeting industrial control systems. The article also offers advice on securing cross-account access in cloud environments, provides resources for building effective security programs, and details techniques for detecting container escape vulnerabilities. Finally, it touches upon broader security issues such as the adoption of passkeys, potential risks associated with widely used open-source software, and law enforcement actions against cybercrime services.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    14 mins
  • LLMs in Cybersecurity
    May 7 2025

    These sources discuss the growing integration of Large Language Models (LLMs) into cybersecurity, exploring both their benefits and associated risks. They highlight how LLMs can enhance threat detection, automate security tasks, and improve various defensive strategies. Simultaneously, the texts address the significant security challenges introduced by LLMs, including vulnerabilities like prompt injection, training data poisoning, and the potential for misuse in generating malicious content. Several sources emphasize the importance of ethical considerations, transparency, and robustness in the development and deployment of LLMs for security applications. The need for ongoing research and adaptation to counter the evolving threat landscape powered by AI is a recurring theme.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    12 mins
  • InfoSec News and Vulnerability Reports
    May 6 2025

    This security-focused publication covers various recent cyberattacks and vulnerabilities, including breaches affecting Kelly Benefits and TeleMessage, along with a hack targeting an airline used for deportations. It also presents strategies and tactics like fuzzing and Kubernetes security policies. Furthermore, the source announces new security products and tools, such as a digital risk protection service and a DNS firewall. Finally, the text touches upon miscellaneous security news, including regulatory fines for TikTok and White House budget proposals for a cybersecurity agency.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    14 mins
  • Exploring Enterprise Browser Solutions for Security
    May 6 2025

    These sources collectively describe the Enterprise Browser, a new type of web browser designed for businesses. It offers enhanced security, control, and manageability compared to consumer browsers, which are not equipped for the complexities of corporate use and modern threats. Enterprise Browsers provide features like granular policy enforcement, data protection, centralized management, and seamless integration with existing enterprise tools, addressing challenges such as securing SaaS applications, supporting BYOD, and reducing reliance on expensive VDI solutions. Case studies from the healthcare system and Pfizer illustrate real-world applications and benefits, including improved user experience, cost savings, and strengthened security posture. The texts also discuss the future of Enterprise Browsers, highlighting their growing adoption and their role in strategies like Zero Trust Access.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    23 mins
  • AWS Workspaces: Security, Best Practices, and Monitoring
    May 6 2025

    These sources provide an overview of Amazon WorkSpaces, a managed cloud service offering virtual desktops, highlighting its comparison with Azure Virtual Desktop in terms of features and limitations, particularly concerning Microsoft 365 Apps licensing and graphics performance. They discuss WorkSpaces pricing models, including hourly and monthly billing options and factors that influence cost like compute type and storage, and also explore cost optimization strategies like the Amazon WorkSpaces Cost Optimizer. The documents also explain the process for migrating from Windows 10 to Windows 11 on WorkSpaces, outlining two primary methods, and emphasize the importance of security best practices for WorkSpaces deployments, such as network configuration, user identity management, and monitoring.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    23 mins
  • Building LLM SQL Agents with LangChain
    May 2 2025

    These sources primarily discuss LangChain's tools for interacting with SQL databases, focusing on the SQL Agent and SQL Database Chain. The LangChain SQL Agent offers a flexible method for querying databases, capable of understanding schemas, recovering from errors, and handling complex questions requiring multiple queries. It can be enhanced with dynamic few-shot prompting for better query generation and custom retriever tools to address issues with high-cardinality columns and proper noun filtering. The discussion also touches on the security risks of executing model-generated SQL queries and potential limitations when dealing with large databases or large table schemas due to prompt token limits.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Show More Show Less
    18 mins