music.amazon.com Open in urlscan Pro
2600:9000:20ed:6000:1b:5d9a:8ad2:bfc1  Public Scan

Submitted URL: https://amazon.restrike.io/
Effective URL: https://music.amazon.com/podcasts/cecef127-e6d6-404d-ab65-a511dfcdd319
Submission Tags: @phishunt_io
Submission: On June 26 via api from DE — Scanned from CA

Form analysis 1 forms found in the DOM

#

<form action="#" autocomplete="off"><input id="navbarSearchInput" class="_2G3xckMGwNcxA2DASq0U49" placeholder="Search" type="search" role="searchbox"><input id="navbarSearchInputShadow" class="daFloUY6yFCuBeKVzL0WL" type="search"></form>

Text Content

 * 
 * HomeHome
 * PodcastsPodcasts
 * Library
   
   Cancel
 * Sign in


Follow
Restrike brings you a daily feed of the latest news in CyberSecurity
Start Here
26-06-2023
How Infrastructure as Code Can Help Minimize Human Error
Infrastructure as code lets organizations manage cloud infrastructure with the
same versioning, testing, and automation processes they use for application
code.
https://www.darkreading.com/microsoft/how-infrastructure-as-code-can-help-minimize-human-errorSupport
the show
1 min
26-06-2023
How Infrastructure as Code Can Help Minimize Human Error
Infrastructure as code lets organizations manage cloud infrastructure with the
same versioning, testing, and automation processes they use for application
code.
https://www.darkreading.com/microsoft/how-infrastructure-as-code-can-help-minimize-human-errorSupport
the show
1 min
26-06-2023
Trojanized Super Mario Installer Goes After Gamer Data
A legitimate installer for the popular Nintendo game infects Windows machines
with various malware, including a cryptominer and an infostealer, again
showcasing the importance of remote worker security hygiene.
https://www.darkreading.com/endpoint/trojanized-super-mario-installer-gamer-dataSupport
the show
2 min
26-06-2023
Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack
An unknown cryptocurrency exchange located in Japan was the target of a new
attack earlier this month to deploy an Apple macOS backdoor called
JokerSpy.Elastic Security Labs, which is monitoring the intrusion set under the
name REF9134, said the attack led to the installation of Swiftbelt, a
Swift-based enumeration tool inspired by an open-source utility
called SeatBelt.JokerSky was first
https://thehackernews.com/2023/06/japanese-cryptocurrency-exchange-falls.htmlSupport
the show
2 min
26-06-2023
3 Steps to Successfully & Ethically Navigate a Data Breach
In this day of not if, but when for breaches, transparency and full disclosure
are important to salvage a companys reputation and keep public trust.
https://www.darkreading.com/attacks-breaches/3-steps-successfully-ethically-navigate-data-breachSupport
the show
1 min
26-06-2023
How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To
Prevent Other Key AI Risks in SaaS
Security and IT teams are routinely forced to adopt software before fully
understanding the security risks. And AI tools are no exception.Employees and
business leaders alike are flocking to generative AI software and similar
programs, often unaware of the major SaaS security vulnerabilities theyre
introducing into the enterprise. A February 2023 generative AI survey of 1,000
executives 
https://thehackernews.com/2023/06/how-generative-ai-can-dupe-saas.htmlSupport
the show
2 min
26-06-2023
Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been
sentenced to five years in prison in the U.S.Joseph James OConnor (aka
PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of
New York, a little over a month after he pleaded guilty to the criminal schemes.
He was arrested in Spain in July 2021.The infamous Twitter breach allowed the
https://thehackernews.com/2023/06/twitter-hacker-sentenced-to-5-years-in.htmlSupport
the show
1 min
26-06-2023
U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities
Catalog
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of
six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence
of active exploitation.This comprises three vulnerabilities that Apple patched
this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in
VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel
https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.htmlSupport
the show
2 min
26-06-2023
How Active Directory Bridging Extends Security Automation to Hybrid IT
Environments
AD bridging extends the reach of your AD domain to non-Windows systems,
providing centralized security, single sign-on, and compliance.
https://www.darkreading.com/endpoint/how-active-directory-bridging-extends-security-automation-to-hybrid-it-environmentsSupport
the show
1 min
26-06-2023
Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been
sentenced to five years in prison in the U.S.Joseph James OConnor (aka
PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of
New York, a little over a month after he pleaded guilty to the criminal schemes.
He was arrested in Spain in July 2021.The infamous Twitter breach allowed the
https://thehackernews.com/2023/06/twitter-hacker-sentenced-to-5-years-in.htmlSupport
the show
1 min
26-06-2023
U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities
Catalog
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of
six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence
of active exploitation.This comprises three vulnerabilities that Apple patched
this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in
VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel
https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.htmlSupport
the show
2 min