Season
Season 7
Social Engineering
Game Day Decision
Rockstar and Uber suffered similar cyberattacks. This episode stresses vigilance and a “verify before you trust” policy to protect against bad actors.
Network & Device Security
Update with Destiny
Apple devices are vulnerable to hackers. Update software timely to secure your devices and information from potential security threats. Watch now to learn more!
Credential Hygiene
Sleuth or Consequences
Cisco was breached by a threat actor due to poor employee credential hygiene. Learn about preventing cyber-attacks caused by poor credential management with Jon Lovitz.
Call Center Scams
Call Me
Flagstar Bank customer data was stolen in a breach. This episode, starring Tia Carrere, shows how common call center scams work to help you prevent threats.
Phishing, Smishing, & Vishing
The Playbook
Hackers stole $100M from Horizon via a “private key compromise,” possibly through spear phishing. A video episode shows a similar crypto cybercrime attempt.
Ransomware
Cliffhanger
Bridgestone’s ransomware attack shut down production. Learn how cyberattacks have devastating digital and physical effects, and how to protect your organization.
Insider Threats
Help Wanted
Learn about LAPSUS$’s cyberattacks on companies like NVIDIA and Microsoft, and how they recruit insiders. Watch to understand insider threats and how to secure your organization.
Cybersecurity Culture
Whole > Sum
Cultivating a strong cybersecurity awareness culture is vital when cyberthreats are high, as every individual plays a critical role in mitigating risk.
Catphishing
Gone Catphishing
Learn about “Catphishing” in the workplace, where con-artists trick corporate victims into sending sensitive information to compromise an organization.
Malware
Troubled Waters
The “Log4J” vulnerability poses extreme risk, allowing data manipulation & malware. Learn about Log4J, watering hole attacks, and how to avoid cyber threats.
Malicious Apps
Attack of the Apps
Banking Trojan Malware hit over 300K Android users via malicious Google Play apps, stealing login credentials. Learn how to protect your devices from cyberattacks.
2FA Bots
Bad Robot
Learn how crimeware services like “2FA Bots” bypass multi-factor authentication for sensitive accounts. Protect yourself from these growing Dark Web cyberattacks.