Transcript
A (0:01)
All right. Good morning, everybody. Welcome to the party. Today is Monday, March 9, 2026. This is episode 1084 of your Simply Cyber Daily Cyber Threat Brief podcast. I AM your host, Dr. Gerald Ozier, coming to you live from the Buffer Osier Flow Studio. And if you're looking to stay current on the top cyber security news stories while getting insights and analysis of those stories, having acronyms spelled out, and doing it all alongside an amazing, inclusive, supportive cyber security professional community, well, then, my friend, settle in because you're in the right place. We're off and running on this beautiful Monday morning. Hey, what's going on? Back from Orlando, Zero Trust World here at the Buffer Ocean Flow Studio. Get it done. To all those who were there last week, Shout out to all you. We got Ross And Jonathan and TJ, obviously, Kathy, Kimberly, James, FedEx. New friends like Bow Tie Security. Oh, gosh, guys, it was a great one. Good to see you. A.A. witherspoon and A.D. tech team solo. Guys, I want to let you know, every single episode of the Daily Cyber Threat Brief, we're going to go through eight stories, and each of those stories I'm going to break down. So, you know, you can read the stories yourself and do it that way. But what's the value prop? Well, the thing is, I've got 20 plus years of experience. Many folks in chat directly above my head have oodles and oodles of experience. And we love supporting, mentoring, and giving back. So we break down those stories and go beyond the headlines to give you things that you're not going to get in a classroom or a textbook or anything like that. And we continue the party over on the Discord server. Simply Cyber IO Discord. So get in there, get engaged. It's a little warm here in the Buffer Ocean. Sitting here, starting to get like a low sweat in here. Let's take it down to 72 degrees. All right, guys, good to see you all. Guys, every single episode of the Daily Cyber Threat Brief, the eight stories that we're gonna go through. Not yours, mine. One. Great meeting. You too, bud. Listen, every single one of the eight stories, right, I give you expert analysis, right? So effectively, this is a instructor led webinar, which means we can qualify this for CPEs, CPUs, Continuing Professional Education credits. So it's very easy if you have a cyber security certification that you need to maintain with CPEs. Say what's up? In chat, you show directly above my head in the news or on the stream, right? So it's permanently burned into the record. Grab a Screenshot. In the screenshot, include the episode title. What you might note has today's date, March 9th. It also has the episode number 1084. This is what we like to call in the auditing biz. A unique identifier, a piece of forensically sound evidence, and therefore perfect. So all you gotta do, come here every day, check out the show, say what's up in chat. Grab a screenshot, file it away. Once a year, submit your CPES to your cyber security certification body. And then if they ask, hey, wait a minute. What is this daily cyber threat brief that you put a hundred cpes for? I don't believe you. You can simply send the screenshots and say, if there'll be anything else, you can take it up with my assistant. Thank you very much. All right, let me put a little lip balm on. I'm a big old Burt's beeswax vanilla bean hound. I never really did chapstick growing up, and now I'm like a chapstick fiend. I'm like Eric B and Rakim, except instead of a microphone feed, I'm a bird's beeswax fiend. All right, guys. Hey. I met many of you for the first time last week at Zero Trust World. But first timers can come in multiple forms and fashion. So if you are here for the first time with us today, if you. You're typically on replay. If you've never heard of us before, if you typically listen on audio only, whatever your situation is, you're here now and I'd like to say welcome to you. So do me a favor. If it is your first time, in whatever capacity, give me an excuse to use the sounder. Drop a hashtag first timer in chat. Now, if you're driving or if you're on the elliptical, you're lifting weights, I get it, you can't get to the keyboard. But if you can get to the keyboard and it is your first time, drop a hashtag first timer in chat. Because we have a special sound effect. Welcome to the party. Welcome to the party, pal. It basically captures exactly the vibes of how I feel about welcoming you all while having, like a late 80s, early 90s vibe to it. As always, we got simply Cybercon coming up here in November. Details to follow. Very soon, we're going to have the website up for CFPs. Jonathan's gonna submit from Kentucky. Allegedly. We'll see. All right, guys. Angie, Rosie, first timer squad members, please. Let's welcome Angie, Rosie Straw hat sack. Come on now. Welcome to the party, pal. Angie, Rosie, I think. I hope you got a. I hope you have a good time. I'm gonna go ahead and drop a emote. Air the John McLean emote for Angie Rosie. There we go. Good to see you, Angie. Rosie. All right, guys, do me a favor. Oh, wait, before I get into it, gotta pay the bills. Yikes. Yeah, ain't nobody got time for this. All right. Hey, before I get into it, let me say a shout out and thank you to the stream sponsors, those who enable me to bring this show to you every single day of the week. Tech Ricky's in the hisy. Good to see you, Tech Ricky. Code brew. Good to see you. All right, guys, let's holler at anti siphon training. Anti siphon training. Disrupting the traditional cyber security training industry by offering high quality, cutting edge education to everyone. Now let's look at this. Oh yeah, my man, Jason Blanchard, AKA Banjo crash Land. This is a very popular one. If you guys have not been to this one, Jason Blanchard, he hosts this from time to time and it's called job hunt like a hacker. It is a interactive six hour workshop for free. You can pay up to, you know, if you want to donate to support the cause, you can throw 25 at it, but you can't submit anymore and it's six hours. Listen, if you are looking for a job right now and you're looking for some innovative, interesting ways to find a job in 2026, Jason can help you. He's been doing this for a while. He updates the curriculum. This is very cool and Jason's very good people. So I'll drop a link to chat. You can do this on March 10th tomorrow at 10:00am Eastern Time. So come on by tomorrow. Listen, if you're looking for a job, you might have some free time, right? So don't even think of it. Think of this as investing in yourself. Right? Come do the daily cyber threat brief from 8 to 9, jawjack till 9:30, get a cup of coffee, hit the head, come back for Jason Blanchard in six hours of in your face learning. I dropped the link in chat. Thank you. Anti siphon training as always. Now I do, I do love myself some flare Threat intelligence platform. If you didn't know. Flare. Let me, I have to do this really quickly. I got to do the. The drive. All right, here we go. Come on, man. Need to see the video, son. All right. Hey. Flare Cyber threat intelligence platform offer. You're looking at a live shot of it or a video recording demo of it right now. If you are worried, like, listen Guys, we put protection controls in place all over the place, but if we get compromised, if a threat actor is able to compromise an endpoint and put info stealers on it, if they're planning an attack on you, your protection controls aren't going to make you aware of that because they were obviously able to get past them. Or if you have like low, you know, like an immature cyber security program, Cyber Threat intelligence platform Flare allows you to see all sorts of information that has been mined from the dark web from threat actor telegram channels from all the places. And you can find easily through their interface compromised systems, compromised credentials, compromised identities and more. It's very, very powerful. I'm a huge fan of Flare. I'm just blessed that I get to that they pay me to tell you about it in addition to the fact that I like, really like this platform. If you are using it, you know what I'm talking about. Please drop your thoughts in chat and if you are looking to check it out, go to simply Cyber IO Flare. You'll have to fill out this form that you see on screen right here. It is a two week free trial but they can't give this access to threat actors because it's too powerful. So they do have to validate your identity in order to make sure that you're a good person. So that's the steps, all about that. Now let's just hear a quick word from Threat Locker who announced their at@0 trust or they made a big announcement about how they're going to be going into the cloud space and protecting Deny by default up there. Quick word from Threat Locker and then we're gonna, we're gonna get crazy on the news. I want to give some love to the daily cyber threat brief sponsor, Threat Locker. Do zero day exploits and supply chain attacks. Keep you up at night. Don't worry no more. You can harden your security with Threat Locker. Worldwide companies like JetBlue Trust Threat Locker to secure their data and keep their business operations flying high. Threat Locker takes a deny by default approach to cybersecurity and provides a full audit of every action allowed or blocked for risk management and compliance. Onboarding and operation is fully supported by their US based Cyber Hero support team. Get a free 30 day trial and learn more about how ThreatLocker can help prevent ransomware and ensure compliance. Visit threatlocker.com DailyCyber. All right, all right, we're about ready to go. And Paul Savage, if you're looking for the discord, you can do exclamation point discord in chat and the little AI bot here will. Shall we play a game? See, there you go, Paul. He drops a little link for us. Hello, all you, Scott Ocean. All right, guys, do me a favor. Everybody knows the drill. Angie, Rosie, you are new here as a first timer, so let me introduce you to a little thing that we like to do. Angie, Rosie, I need you to. I need you to sit back, relax, and just let the cool sounds of the hot news wash over you in an awesome wave. I will see you at the mid roll. Lives and dies on trust. So why do so many vendors from the CISO series? It's cybersecurity headlines.
