music.amazon.com
Open in
urlscan Pro
2600:9000:20ed:6000:1b:5d9a:8ad2:bfc1
Public Scan
Submitted URL: https://amazon.restrike.io/
Effective URL: https://music.amazon.com/podcasts/cecef127-e6d6-404d-ab65-a511dfcdd319
Submission Tags: @phishunt_io
Submission: On June 26 via api from DE — Scanned from CA
Effective URL: https://music.amazon.com/podcasts/cecef127-e6d6-404d-ab65-a511dfcdd319
Submission Tags: @phishunt_io
Submission: On June 26 via api from DE — Scanned from CA
Form analysis
1 forms found in the DOM#
<form action="#" autocomplete="off"><input id="navbarSearchInput" class="_2G3xckMGwNcxA2DASq0U49" placeholder="Search" type="search" role="searchbox"><input id="navbarSearchInputShadow" class="daFloUY6yFCuBeKVzL0WL" type="search"></form>
Text Content
* * HomeHome * PodcastsPodcasts * Library Cancel * Sign in Follow Restrike brings you a daily feed of the latest news in CyberSecurity Start Here 26-06-2023 How Infrastructure as Code Can Help Minimize Human Error Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code. https://www.darkreading.com/microsoft/how-infrastructure-as-code-can-help-minimize-human-errorSupport the show 1 min 26-06-2023 How Infrastructure as Code Can Help Minimize Human Error Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code. https://www.darkreading.com/microsoft/how-infrastructure-as-code-can-help-minimize-human-errorSupport the show 1 min 26-06-2023 Trojanized Super Mario Installer Goes After Gamer Data A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene. https://www.darkreading.com/endpoint/trojanized-super-mario-installer-gamer-dataSupport the show 2 min 26-06-2023 Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month to deploy an Apple macOS backdoor called JokerSpy.Elastic Security Labs, which is monitoring the intrusion set under the name REF9134, said the attack led to the installation of Swiftbelt, a Swift-based enumeration tool inspired by an open-source utility called SeatBelt.JokerSky was first https://thehackernews.com/2023/06/japanese-cryptocurrency-exchange-falls.htmlSupport the show 2 min 26-06-2023 3 Steps to Successfully & Ethically Navigate a Data Breach In this day of not if, but when for breaches, transparency and full disclosure are important to salvage a companys reputation and keep public trust. https://www.darkreading.com/attacks-breaches/3-steps-successfully-ethically-navigate-data-breachSupport the show 1 min 26-06-2023 How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And AI tools are no exception.Employees and business leaders alike are flocking to generative AI software and similar programs, often unaware of the major SaaS security vulnerabilities theyre introducing into the enterprise. A February 2023 generative AI survey of 1,000 executives https://thehackernews.com/2023/06/how-generative-ai-can-dupe-saas.htmlSupport the show 2 min 26-06-2023 Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years in prison in the U.S.Joseph James OConnor (aka PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of New York, a little over a month after he pleaded guilty to the criminal schemes. He was arrested in Spain in July 2021.The infamous Twitter breach allowed the https://thehackernews.com/2023/06/twitter-hacker-sentenced-to-5-years-in.htmlSupport the show 1 min 26-06-2023 U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.htmlSupport the show 2 min 26-06-2023 How Active Directory Bridging Extends Security Automation to Hybrid IT Environments AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance. https://www.darkreading.com/endpoint/how-active-directory-bridging-extends-security-automation-to-hybrid-it-environmentsSupport the show 1 min 26-06-2023 Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years in prison in the U.S.Joseph James OConnor (aka PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of New York, a little over a month after he pleaded guilty to the criminal schemes. He was arrested in Spain in July 2021.The infamous Twitter breach allowed the https://thehackernews.com/2023/06/twitter-hacker-sentenced-to-5-years-in.htmlSupport the show 1 min 26-06-2023 U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.htmlSupport the show 2 min