Transcript
A (0:01)
Good morning, everyone. Welcome to the party. Hey. If you are looking to stay current on the top cyber security news story of the day, while being educated and entertained, ultimately to be able to allow yourself to crush it as a cyber pro while you're in the right place. Because over the next hour, if you stick around, you're going to be getting the eight top stories. You're going to be engaging with the simply Cyber community, which you're part of at the moment, and you're going to have a great experience ready to Crush this Tuesday, February 17th. I'm Jerry your chat. Let's get cooking on this day's news, shall we? All right. Good morning, everybody. I hope you are having a great Tuesday and a good start to your week. Wherever you are, whatever you're doing, you're awesome and I love it. Starting to warm up here in the low country. I'm a big fan of that. Going to be teaching later today, so stay tuned for Jawjacking with Eric Taylor at the top of the hour. Guys. Every single episode of the Daily Cyber Threat Brief, I do not research or prep for Ain't nobody got time for that. Ain't nobody got time for that. So you'll be getting my honest, rough, you know, raw, rugged, hot takes and opinions on each of these stories. Now, as always, I like to tell you, you can consume these stories on your own. You could do an RSS feed, you could have a date, you know, AI build you a daily digest. But what I promise you here is that you'll get additional value, because I like to go beyond the headlines. I've got 20 years of experience in industry, and there's just a lot of things that you don't learn in a classroom or a textbook. And when you're reading the stories, having the context definitely gives you additional value. I've had literally multiple people message me privately or publicly on LinkedIn and say, dude, because of, you know, because you're breaking down these topics, because you're using the acronyms, because you're making it accessible. I was able to ramp into cybersecurity or I was able to level up my career much faster because of simply Cyber. So that gives me a lot of pride. It makes me feel really warm inside. So that's what we're doing here every day for better or for worse. Now, every single episode of the Daily Cyber Threat Brief basically qualifies as an instructor led me webinar the stream here. So because it qualifies as that, I want you to know that every episode is worth half A cpe. So it's very simple. Say what's up in chat. Kind of like Kathy Chambers, Mara Levy, tip top, Clay Anthony and ad tech. Etc. Say what's up? Grab a screenshot. Jessica Hyde. Jessica Hyde, digital forensics extraordinaire. Jessica Hyde's in the house. Welcome to the party. Jessica Hyde. Welcome to the party. All right. Jessica Hyde's like a human version of a cup of coffee. Like drink the cup of coffee. I get amped up for the day. I see Jessica Hyde. I'm like, what's up? I'm totally locked and loaded now. All right, so every episode's a half a cpe. So say what's up in chat. Grab a screenshot. Now check it out. The title of the show has today's date and a unique identifier. And the reason I do that is so your CPE evidence, the screenshot you're supposed to take will be. Basically no auditor is going to be able to question it. So go ahead, file it away. Once you count those screenshots up, you can earn up to 120 CPEs per year, which is exceeds any certification bodies requirements that I'm aware of. So it's easy as that. Now if you are a first timer, if you're here for the first time, say what's up in chat with a hashtag first timer. And please, I, I implore you, don't be shy. Okay? A lot of people feel like lurker shy. Oh, I don't want to bring attention to myself because I, I'm new here. I, I don't want, you know, the light on me. It's not even like that. Okay, Just say what's up in chat. We're a pretty supportive, inclusive community and I just want to say hi to you, the squad members. We have a special little emote, a special sound effect. I already demonstrated it for Jessica Hyde. So if you're here for the first time, we. Welcome to the party, pal. I hope you have a wonderful experience for sure. Good morning from Seattle S Rome 05. Getting up early this morning on the left coast. Good night or good good on you. Oh my God. The coffee. Got up early today. Yelling at my open claw bot this morning because it's not running. My cron jobs did not execute and I'm not happy about that. I do find it funny how I, how, how like when I'm working with somebody, if there's like a failure or mistake or something, I feel like I'm pretty gracious about it. When my AI bot fails, I'M like like AI Bot. You better fix it. Cyber Psycho Hanzo first timer Catching the live stream frequently on the audio. Cyber Psycho Hanzo welcome to the party pal. Welcome to the party pal. All right guys, I do want to say shout out and thanks to the stream sponsors, those who enable me to bring this show to you every single weekday morning. And today is no different. I'm. I'm very excited. These sponsors, their links are in the description below. If you want to support the channel and potentially help yourself out, click those links below. I don't pick sponsors. I don't do business with shady, you know, organizations. This isn't a cash grab. I do need to fund the, you know, the Buffer ozer Flow studio of course, but I don't do deals with sussy sus organizations. All right, we're gonna try this right now. Here, let me read the material on first. Guys, stop email attacks. Let me say shout out thanks to Material Security. Very simple. If you got Google workspace or Office 365, listen up. Especially if you are a midsize, small midsize business and you don't have a lot of headcount, Cloud workspace security is wicked hard. Email security alone stops fishing at the perimeter. But that is not enough. Today's threats target email files accounts across the entire workspace. So Material, the show sponsor here protects the Google Workspace and Microsoft 365. By giving that holistic visibility and automated remediation across your entire cloud environment, you can detect and protect sensitive data, monitor account threats, etc. I used material to do a kind of like an audit of I use Google Workspace for my business and I did like a material questionnaire thing and I actually found some things in Google Workspace that I didn't even know about, which is why I hadn't configured it. But don't worry, I took care of it. You know what the best part about Material is? Not that they used advanced AI detections to automate user report triaging, but it scales your security capabilities without scaling your team. So you get all the benefits without the overhead of, you know, finding talent, hiring talent, getting them up and running, plus the expensive labor. Go to simply Cyber IO Material to learn more. Shout out and love to Anti Siphon training dudes. Anti Siphon training. Super disrupting the traditional cyber security training industry by offering high quality, cutting edge education to everyone regardless of financial position. And I want to call your attention to this particular opportunity. This is available tomorrow. We got an Australian in the house. Toby coming in from Australia Oi, oi, oi. Toby. Good to see you, my friend. Thank you for being here. Welcome to the party on LinkedIn. Guys, listen, active Directory, you're going to find it in pretty much 99 of environments that you work in. Whether you're a defender, pen tester, GRC person, you're going to have Active Directory and spoiler alert, it's going to look wicked ugly and messy because it's just a bunch of like technical debt in there. Ad. AD is a hot mess. Express the group policies, everything. But that's not what this is about. Active Directory is constantly adding capabilities. But did you know about them? I don't know. If you do. The good news is tomorrow at noon Eastern time for one hour, Eric Kuhn's going to be doing a free webinar on adapting to Active Directory security enhancements, where you're basically going to be able to learn about how the new security enhancements at AD can be configured and more importantly, how they can stop threat actors from moving along your environment and getting all the crown jewels again. It's free, free, free, free. Which is why I say my recommendation is sign up. Sign up, get it on your calendar and then if you don't go, no big deal. Nobody's gonna be like, wait a minute, wait a minute. Calvin Whitney signed up and did not appear. They are not invited back to this. No, that's not it. Just sign up, get it on your calendar and then decide if you go or not go. You know what I mean? That's simple as that. So thanks to anti siphon training, let's hear from Threat Locker really quickly and then we're gonna get cooking on the news. Let's go. I want to give some love to the Daily Cyber Threat Brief sponsor, Threat Locker do zero day exploits and supply chain attacks. Keep you up at night. Don't worry, no more. You can harden your security with Threat Locker. Worldwide companies like JetBlue Trust Threatlocker to secure their data and keep their business operations flying high. Threat Locker takes a deny by default approach to cybersecurity and provides a full audit of every action allowed or blocked for risk management and compliance. Onboarding and operation is fully supported by their US based Cyber Hero support team. Get a free 30 day trial and learn more about how ThreatLocker can help prevent ransomware and ensure compliance. Visit threatlocker.com DailyCyber. All right my friends, we've got it. Very simple. Here's what I need you to do. You first timers, you long timers know what to do. Sit back, relax and let the cool sounds of the hot news wash over all of us in an awesome wave. I will see you. You guys at the mid roll from.
