『Bare Metal Cyber』のカバーアート

Bare Metal Cyber

Bare Metal Cyber

著者: Dr. Jason Edwards
無料で聴く

このコンテンツについて

Welcome to Bare Metal Cyber, the podcast that bridges cybersecurity and education in a way that’s engaging, informative, and practical. Hosted by Dr. Jason Edwards, a seasoned cybersecurity expert and educator, this weekly podcast brings to life the insights, tips, and stories from his widely-read LinkedIn articles. Each episode dives into pressing cybersecurity topics, real-world challenges, and actionable advice to empower professionals, educators, and learners alike. Whether navigating the complexities of cyber defense or looking for ways to integrate cybersecurity into education, Bare Metal Cyber delivers valuable perspectives to help you stay ahead in an ever-evolving digital world. Subscribe and join the thousands already benefiting from Jason’s expertise!Copyright 2025 All rights reserved.
エピソード
  • Weekly Cyber News Rollup, November 28th, 2025
    2025/11/28

    This is your weekly cyber news roll-up for the week ending November 27th, 2025. This week revolves around quiet dependencies turning into loud problems, from abandoned calendar links that can be hijacked to analytics and customer platforms leaking sensitive context. You will hear about a breach at an OpenAI analytics vendor that exposes who is building on artificial intelligence, A I, projects and a ransomware hit on Asahi and Iberia that mixes large data leaks with operational disruption and reputational damage. Developers face a heavy supply chain week as poisoned npm packages, GitHub workflows, and a self spreading JavaScript worm target build systems and secrets. At the same time, flaws in logging agents, emergency alert platforms, and Ray powered A I clusters show how core infrastructure can be hijacked for stealth access, cryptomining, or simply going dark when people need it most.

    Across the full set of stories, the focus is on how attackers exploit trusted tools and identity layers that many teams treat as background plumbing. You will hear how spyware vendors are turning secure messaging users into targets, how years of pasting code into online tools has quietly exposed live credentials, and how flaws in Oracle identity, Azure Bastion, and Grafana can hand over powerful access with a few crafted requests. Website and endpoint risks also feature, from W three Total Cache and FortiWeb to seven zip, reminding teams that small utilities and plugins can still open big doors. The episode is designed for executives, security teams, builders, and students who need a fast weekly sweep of the real attack surface, stitched across cloud, identity, and software factories, available at DailyCyber.news. By the end, you will have a clear sense of where your own quiet dependencies might be hiding.

    続きを読む 一部表示
    19 分
  • Zero Trust Theater: We Put a Fancy Gate on a Cardboard Wall
    2025/11/26

    In this episode, we uncover the reality of “Zero Trust theater”—where organizations invest in flashy front gates like MFA prompts, dashboards, and vendor logos while leaving the walls behind them flimsy and unprotected. Listeners will learn how these illusions are built, where attackers push through the cardboard, and the specific tactics adversaries use to bypass props. From consent phishing and token replay to legacy carve-outs and SaaS trust chains, the episode paints a vivid picture of why optics without structure fail.

    You’ll also gain practical insight into the skills that strengthen real Zero Trust. By the end, you’ll understand how to operationalize least privilege, enforce identity at every hop, design microsegmentation that actually holds, and measure resilience through meaningful metrics rather than green lights. This is more than theory—it’s a guide to recognizing illusions, breaking free from stagecraft, and building durable frameworks that withstand pressure.

    Produced by BareMetalCyber.com.

    続きを読む 一部表示
    29 分
  • Weekly Update: Cyber News for the Week ending 21 November, 2025
    2025/11/21

    This is your weekly cyber news roll-up for the week ending November 21st, 2025. We track a crippling cyberattack on a major automaker that shut factories and erased hundreds of millions in profit. We also follow a suspected China aligned espionage group that turned an artificial intelligence, A I, coding agent into an automated intrusion assistant. Fresh consumer and supporter data breaches, including a social engineering hit on a food delivery platform and exposure of political affiliation records, show how one person or vendor mistake can unlock large data sets. Critical flaws in Fortinet FortiWeb web application firewalls and an actively exploited Windows kernel bug round out the list of urgent patches for the week.

    You will hear clear run downs of each of the week’s biggest stories, from industrial shutdowns and agent driven intrusions to social engineering breaches and vendor failures. We explain how third party services, software supply chain projects, law enforcement case systems, and cloud platforms like Azure are being probed and stressed, and what that means for executives, security teams, builders, and students trying to stay ahead. Along the way we call out who is most exposed, which signals in logs and dashboards deserve a second look, and which updates should move to the front of the queue. The episode is designed as a fast, practical briefing that you can replay or share with your teams, available at DailyCyber.news.

    続きを読む 一部表示
    30 分
まだレビューはありません