Transcript
A (0:01)
What's up, everybody? Good morning. Welcome to the show. If you are looking to stay current on the top cyber news stories of the day while getting educated and entertained by industry professionals while you're in the right place, welcome to Simply Cyber's daily Cyber Threat Brief podcast. I AM your host, Dr. Gerald Ozier, coming to you live from the Buffer, Osier Flow Studios. We got a great day for you. Get settled in, get your coffee, let's get cooking because it's time to get to work. All right, what's up, everybody? I hope you're doing well. Today is February 26th. This is episode 1077. We're gonna go through eight cyber stories of the day. We're gonna break them down, and again, you can go through these stories on your own. You can have RSS feeds. Heck, you can even have AI write you a daily brief and have it piping hot in your inbox right at 6am but what you're not gonna get, what you get here, in addition to the ls, if you will, is we're gonna go beyond the headlines. Know there's a lot of industry professionals, myself with 20 plus years in the GRC space, CISO space, we're going to go beyond the headlines and tell you how you can operationalize this information or whether it's worth operationalizing. We had a story yesterday where I made fun of it because it was absolutely a nothing burger. But if you're new to the industry, maybe you don't know how to evaluate one thing from the next. You don't know how to dig in and get under the hood of things. And that's what we do here at Simply Cyber. We inspire, we educate, we support, we empower you to go as far as you want. Right? I can put everything, I can lay everything out on the table, but I can't force feed you. That's not my speed. Now for the eight stories we're going to go through. You might think this is reckless, but no, it's part of the experience. We don't. I don't research or prep for any of these. I have no idea what's coming. Ain't nobody got time for that. That's right. Ain't nobody got time for that. But we'll do the best we can. We've done it 1,076 times before and it's been okay, right? We've. We've made it happen. If you're here for the first time, what's up? You drop a hashtag first timer in chat, hashtag first timer in Chat. We have a special sound effect for our first timers. We have a special emote, and it could be your first time. Like you just found us. It could be your first time in studio, right? Maybe you listen to us on your audio podcast app of choice, like Spotify, Apple Podcast, maybe your team Replay, and you had a change in schedule and you're checking the show out live, whatever it is. Welcome to the party, pal. First timers unite. I saw I say hello to some. Some folks in chat. Marcus Kyler, Toasty Pops in the Kansas City, Kentucky connection. I see Mar Ley Doom, Kraken dropping bombs here all the time. Tj, Jim Wales, my man Berg, ssj. Space Tacos in the GRC Mafia is in the house. Mondo Ailia. That blue badge is looking good, guys. Every single episode of the Daily Cyber Threat Brief is worth half a cpe. A Continuing Professional Education credit. And you need these in order to maintain existing cyber Cyber security certifications that you worked so hard to obtain. If you don't have a cyber security certification, that's okay. I would still recommend you collect cpes, because if you plan on getting one this year, then you'll already be, like, you know, ahead of the curve on getting your CPEs done, right? You're picking up what I'm putting down here. So how do you get the CPEs? First of all, stay through the show. Like, that's. That's a requirement. That's not optional. You have to stay for the hour, right? Say what's up in chat right above me. You will appear on the stream. You are part of the show. You are live with us. Grab a screenshot with the title of the show and the episode number in the title and. And your message in the chat. Right? That's a piece of forensically sound evidence. It shows you are here. It's like your ticket stub that you went to the movies. Okay? File it away in a desktop folder called Daily Cyber Threat Brief Screenshots, right? Get crazy. And once a year, count up those screenshots, divide by two, because every CPE is one hour. But we goof around here. We have fun. So 30 minutes is a safe bet. Marcus Kyler, Detroit's own 38 months, three plus years with the Simply Cyber team. Don't know where I'd be without Jerry and Team sc. Marcus, we are better. Community with you in it, my friend. No doubt about that. DJ B's in the house, my man. Love myself some DJ B. Another solid stalwart of the community, providing mentorship to all. All right. It's Thursday, which means every day of the week has a special segment. And for Thursdays, we know it's not dad joke of the week, it's Dan Reardon's what's your meme? This guy. I love it. You are going to love it. We allow people to try to guess what the meme is going to be. I got to tell you, Dan was inspired by something that happened yesterday. I know Elliot Matice and others like to guess what it could be. So go ahead, drop those in. But yes, a unique one of one meme of the week. We should nft these. Justin. Crypto. All right, but before we get into the news, before I melt your face, I am going to take a slug of this coffee, please. If you have a cup, drink. Oh so good. Mad Destroyer knows what I'm talking about. When you get that. When you get that coffee and it just hits. All right, this show's not made possible without the support from our sponsors. Let me tell you about flair. I hope you guys got to go to the flare CTF walkthrough yesterday. If you did go to that sound off in chat, I would like to know how it went. Guys. Oh wait, I gotta show you the. Hold on one second here. Let's. Let's do this. Let's talk about Material instead. I'm actually. Hey, by the way, Material Security, they've been a sponsor for the month. I had a call with them yesterday. I'm actually going to try to deploy this in my own business because I use Google Workspace for simply Cyber. Right. If you didn't know that I was Microsoft 365 but I don't like it. I don't like Microsoft 365. So I switched over to Google Workspace and I should say I like Google Workspace better for my workflows. So I'm going to deploy this myself actually. Listen, about material security. Cloud workspace security is hard. Email security alone stops phishing at the perimeter. But that's not enough. Today's threats target email files and accounts across your entire workspace. Material protects Google workspace and Microsoft 365 by providing holistic visibility and automated remediation across your entire cloud environment. And it goes beyond phishing protection to detect and protect sensitive data, monitor account threats, respond to risks across the workspace. Now Material uses advanced AI detection, automates user report triaging and delivers flexible one click remediation for email files and account issues. Best of all, it scales your security without scaling your team protects your entire workspace at the Cost of traditional email security. So if you want to learn more about this, go to Simply Cyber IO Material. Many of you know like I run a small business, right? I am in addition to being the CEO and janitor, I'm also like information security. Like I was. We use Crowdstrike here, right? For our edr. I only have five licenses but we use edr. I had to go in yesterday and clean up the. The queue, right? Somebody called casually Joseph and Wade Wells. Let them know I'm clearing cues out up in this piece. Dan Reardon. So I'm looking forward to trying out material. Also want to say what's up to Anti Siphon Training? If you've been taking John Strand Cyber Security Foundations course, today's your last day. I hope you've been enjoying that. Looks like let's go to March. Can't believe it's almost March, y'.
