『Matthews Cybercraft』のカバーアート

Matthews Cybercraft

Matthews Cybercraft

著者: Ed Matthews
無料で聴く

今ならプレミアムプランが3カ月 月額99円

2026年5月12日まで。4か月目以降は月額1,500円で自動更新します。

概要

Offering up to date cyber news with discussion about identification and remediation strategy. Also special episodes about infosec topics of interest. Audience - beginner - intermediate - advanced Real-world cybersecurity, forged through experience.Ed Matthews
エピソード
  • Matthews CyberCraft Threat Intel Briefing - April 15th 2026
    2026/04/15

    Today’s highlight: Adobe released a critical zero-day patch for Acrobat Reader — a vulnerability actively exploited in the wild. This isn’t just an update; it’s a race against hackers who can embed malicious code in PDFs to run arbitrary commands on your system. And guess what? It impacts both Windows and Mac users.This kind of threat isn’t on the typical patch schedule. It’s third-party, so it slips past your usual updates unless you’re vigilant. Do you know how many machines in your network have Adobe? Do you have a process to detect and patch these out-of-band vulnerabilities quickly?Here's the real insight: patching isn’t just a tech issue, it’s a cultural one. The faster your team reacts, the less risk you carry. But are your policies and monitoring tools set up for this? Or are you just waiting for the next breach to respond?Worth thinking about. When was your last zero-day patch?#Cybersecurity #ZeroDay #PatchManagement #ThreatIntelligence #InfoSec

    続きを読む 一部表示
    21 分
  • Matthews Cybercraft Intelligence Briefing - 3/24/2026
    2026/03/24

    Cybersecurity failures often happen in ways you wouldn’t expect—like a small device in a vehicle causing a chain reaction that leaves thousands of drivers vulnerable. In this episode, Ed Matthews uncovers a recent cyber attack on ignition interlock systems used by DUI offenders—demonstrating how a backend system shutdown impacted 10% of users, nearly locking drivers out of their vehicles. The lesson? Even seemingly minor components in interconnected systems pose massive security risks if overlooked.You’ll discover why third-party tools and back-end systems are often the weakest links—and how attackers exploit vulnerabilities in these “less visible” parts of your infrastructure. Ed breaks down: the risks of unpatched software, exposure points that can be exploited remotely, and the critical importance of layered security. He shares concrete strategies—from monitoring VM activity to applying security patches efficiently—that every security professional needs to protect complex environments.This episode emphasize


    #Cybersecurity #SecurityLeadership #GRC #SOC #CISO

    続きを読む 一部表示
    17 分
まだレビューはありません