Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors
Breaches, phishing, attacker programming, and more, in this week of The Audit. Tales from the Trenches will talk about several scenarios our hosts have experienced with fraudulent situations, as well as ways these hackers implement their tactics. Tune in to The Audit today to hear more! #cybersecurity #protection #itauditlabs #theaudit
DC30 Vishing Competition Black Badge winners Team Spilt Beans
Vishing is happening constantly. Understanding what vishing is and being able to spot these tactics will help protect your information. The Audit presents three guests that won the DEFCON30 Vishing black badge. These guests are here to discuss their experience at DEFCON, as well as their knowledge on vishing. Join us to learn more. #itauditlabs […]
Phishing, Smishing and Other Cybersecurity Threats
Every click matters in the digital world, especially when cybercriminals are crafting increasingly sophisticated traps. Our latest deep dive into the murky waters of phishing, smishing, and digital deception reveals just how creative scammers have become—and how easily anyone can fall victim.<br><br>The team shares recent encounters with text message scams promising everything from free Home […]
Unquoted Service Paths: A Windows Vulnerability
Missing quotation marks might seem trivial, but in Windows service paths, they create serious security vulnerabilities that hackers actively exploit. This episode takes you through the mechanics of unquoted service path vulnerabilities – a Windows-specific issue that continues to plague even sophisticated security products.<br><br>We start by breaking down exactly what these vulnerabilities are and why […]
Personal Information Security Protection in a Modern Era, Part IV
Digital threats lurk around every corner, but your strongest defense might be simpler than you think. We dive into the critical strategies for protecting your personal information in an age where data breaches have become almost routine.<br><br>Your cell phone number serves as a gateway to your identity. By treating it as sensitive information and utilizing […]
Personal Information Security Protection in a Modern Era, Part III
Digital privacy isn't just about hiding what you do online—it's about control. When every click, keystroke, and scroll becomes a data point feeding algorithms designed to predict and influence your behavior, understanding what happens behind the scenes becomes essential.<br><br>Our team dives deep into the hidden world of web privacy, revealing the uncomfortable truth about how […]
Personal Information Security Protection in a Modern Era, Part II
Digital security goes far beyond just having a strong password. What happens after you hit "send" on that email or text message could expose your most sensitive information to prying eyes, marketers, and even hackers. In this eye-opening episode, we dive deep into the hidden truths about personal communication security.<br><br>Most people are shocked to learn […]
Personal Information Security Protection in a Modern Era, Part I
The digital breadcrumbs we leave behind create a startlingly accurate profile of who we are—one that corporations, governments, and malicious actors can exploit. In this eye-opening conversation, the team at IT Audit Labs unpacks the complex and sometimes unsettling reality of personal information security in today’s connected world.<br><br>Kyle breaks down the concept of big data, […]
Introduction to The Audit
Ever experienced the frustration of multiple security audits that yield the same findings with no real path forward? You're not alone. Security audit fatigue is a widespread challenge facing organizations today, and it's exactly why we created IT Audit Labs.<br><br>Welcome to the premier episode of "The Audit," where we introduce our team of cybersecurity and […]