Épisodes

  • Cybersecurity - What to Watch out for in 2026 | The Ciphered Reality Podcast by RITC Cybersecurity
    Jan 9 2026

    In this Latest Episode of The Ciphered Reality Podcast your favourite hosts Mike & Mari discuss about latest Cybersecurity News and the evolving Cybersecurity trends to watch out for in 2026.

    Tune in for a deep dive on the latest news:

    - New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

    - Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

    Stay ahead of the curve with Latest in Cybersecurity News and Tips to Safeguard your Online Presence.

    #ritccybersecurity #mikerotondo #cipheredreality #cybersecurity #cyberawareness #ai #dataprotection

    Afficher plus Afficher moins
    54 min
  • State of Cybersecurity 2025 - A Year in Review | The Ciphered Reality Podcast by RITC Cybersecurity
    Jan 7 2026

    Did you miss out on the latest developments in Cybersecurity, AI & Ransomware attacks across 2025? Then you simply can't afford to miss this insightful conversation where Mike, Mari & Nikki discuss major updates and events related to AI, Cybersecurity and Ransomware Attacks. Subscribe to RITC Cybersecurity to Stay updated on latest in Cybersecurity News.

    Stay Ahead - Stay Secure

    Visit us at: https://ritcsecurity.com/

    #ritccybersecurity #cipheredreality #ransomware #artificialintelligence #AI #cybersecurity #cyberawareness

    Afficher plus Afficher moins
    1 h et 14 min
  • State of Cybersecurity 2025 | Yearly Review Part 1 | The Ciphered Reality by RITC
    Dec 23 2025

    In this episode of The Ciphered Reality, the RITC Cybersecurity team kicks off its 2025 yearly review with a grounded look at how the threat landscape is evolving.

    Mike Rotondo, Nikki Rodriguez, and Mari Cherry break down recent developments that signal where cybersecurity is heading next, from record scale DDoS attacks to how quickly attackers weaponize new exploits.

    Topics covered in this episode include: • Cloudflare mitigating a record breaking 5.6 Tbps DDoS attack • Why 61 percent of attackers are using new exploit code within 48 hours • How XWorm uses steganography to hide malware inside image files • A new AI security approach helping organizations define trust zones for Gen AI models

    This discussion focuses on what these trends mean for real organizations, security teams, and leadership making decisions in 2025.

    🎙️ Presented by RITC Cybersecurity Subscribe for practical cybersecurity conversations, real world analysis, and weekly threat intelligence.

    Afficher plus Afficher moins
    1 h et 3 min
  • Decoding PCI Compliance and How It Protects Consumers Today & Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
    Dec 11 2025

    In this episode, Mike and Nikki break down what PCI compliance really means for businesses and why it remains one of the most important guardrails for protecting consumer payment data.

    They also discuss two active cybersecurity developments: • A Python-based WhatsApp worm spreading the Eternidade Stealer across Brazilian devices • An exploited flaw in the Ray AI framework that has been active for two years

    If you work in payments, retail, hospitality, healthcare, or any business that handles cardholder data, this episode gives you clarity on the controls that matter and how attackers continue to evolve around them.

    Subscribe for weekly insights that help businesses stay informed and resilient.

    Visit us at ritcsecurity.com Follow us on Instagram and YouTube @ritc_cybersecurity

    Afficher plus Afficher moins
    48 min
  • Cybersecurity Fundamentals: Horaditus Trojan and the New ChatGPT Browser Atlas: The Ciphered Reality Podcast by RITC Cybersecurity
    Dec 2 2025

    Cybersecurity risks continue to evolve, and this episode focuses on the fundamentals organizations need to establish, along with three important threat updates from the past week. Mike and Mari explain how teams can strengthen internal security practices and implement training that reduces common incidents.

    NEWS COVERED IN THIS EPISODE

    1. Horaditus Trojan A modular credential-stealing trojan showing increasing activity across payment and enterprise environments. We discuss how it works and the indicators organizations should monitor.

    2. SnatchCrypto APT38 GoldIre Activity connected to North Korea associated threat actors continues to target cryptocurrency platforms and related infrastructure. We outline patterns in their recent tactics and what teams should focus on.

    3. The New ChatGPT Browser Atlas A look at how an AI enabled browser may influence data handling, employee browsing behavior, and internal security controls.

    TOPICS DISCUSSED

    • Core cybersecurity fundamentals that are often overlooked • Practical approaches to implementing security training in SMBs • Human factor risks and how teams can reduce daily exposure • How emerging tools change attack surfaces and policy requirements • Actionable steps leaders can apply without major budget changes

    ABOUT RITC CYBERSECURITY

    RITC supports small and mid sized businesses with • vCISO services • Risk assessments • Compliance programs HIPAA SOC 2 PCI DSS • Incident response planning • Employee security training

    For consultation or inquiries, visit our website: https://ritcsecurity.com/contact

    Afficher plus Afficher moins
    38 min
  • Tips on Safe Online Shopping | Latest News: The Ciphered Reality Podcast from RITC Cybersecurity
    Nov 26 2025

    🛡️ Welcome to The Ciphered Reality Podcast! In this episode, hosts Mike and Nikki dive into essential tips for safe online shopping and discuss the latest cybersecurity threats you need to know about.

    In This Episode: 🛒 Safe Online Shopping Tips - Learn how to protect yourself from fake websites, phishing scams, and fraudulent retailers during your online shopping 🔐 Agent Session Smuggling - Understanding this sophisticated attack technique and how to defend against it ⚠️ TCP Port 8530/8531 Attacks - What you need to know about hackers actively scanning for these vulnerabilities 📰 Latest Cybersecurity News - Mike and Nikki break down the most important security updates from November 2025

    Featured Topics: ✅ How to identify legitimate vs. fake shopping websites ✅ Best practices for secure online transactions ✅ Current threat landscape and emerging attack vectors ✅ Practical security advice for individuals and businesses

    About RITC Cybersecurity: RITC Cybersecurity specializes in Architecture, Operation, GRC (Governance, Risk & Compliance), and Security Frameworks. We're dedicated to helping individuals and organizations navigate the complex world of cybersecurity.

    Connect With Us: 📧 info@ritcsecurity.com 🌐 www.ritcsecurity.com 📺 YouTube: @ritc_cybersecurity 📸 Instagram: www.instagram.com/ritc.cybersecurity

    Hosts: Mike & Nikki

    🔔 Subscribe for weekly cybersecurity insights, tips, and news! 💬 Comment below with your questions or topics you'd like us to cover 👍 Like if you found this episode helpful!

    #Cybersecurity #OnlineShopping #CyberSecurity2025 #InfoSec #DataProtection #CyberThreats #SecurityPodcast #RITCCybersecurity #CybersecurityNews #OnlineSafety

    Stay safe online! 🛡️

    Afficher plus Afficher moins
    47 min
  • Robust Cybersecurity Solutions for Your Business: The Ciphered Reality Podcast
    Nov 24 2025

    🔒 RITC Cybersecurity Podcast | Latest Breach News, Threat Insights & Expert Breakdown (31st Jan 2025)

    In this episode, Mike and Mari dive into two major cybersecurity stories shaking the industry this week:

    🔥 Headlines Covered

    1. Schneider Electric Data Breach by Hellcat Ransomware Gang We unpack how the attack unfolded, what it reveals about supply-chain security risks, and the immediate steps businesses should consider to protect themselves.

    2. DeepSeek Exposes Database with Over 1 Million Chat Records A breakdown of the exposure, what went wrong, and what this incident teaches us about API security, data governance, and AI-powered platform risks.

    🎙️ Why This Episode Matters

    Cyber threats are evolving faster than most businesses can react. Mike & Mari simplify the noise—bringing expert analysis, practical security takeaways, and real-world lessons for SMBs and IT leaders.

    🛡️ Presented by RITC Cybersecurity

    Helping organizations build stronger security architecture, governance, compliance, and operational resilience.

    If you’re a business owner, CIO, CTO, or security leader, this episode gives you the clarity you need to stay ahead of modern threats.

    Afficher plus Afficher moins
    41 min
  • Phishing & Ransomware Prevention | AI Agent Security & Cybersecurity News: The Ciphered Reality Podcast
    Nov 8 2025

    🎙️ PHISHING & RANSOMWARE PREVENTION | Latest Cybersecurity News & Best Practices

    In this episode, we dive deep into two rapidly emerging cyber risks impacting businesses across the U.S.:

    🔹 AI Agent Security – Whose responsibility is it? With AI adoption exploding across industries, organizations are now facing a new threat landscape. Who is accountable when an AI system leaks sensitive data, takes action autonomously, or becomes a new attack vector?

    🔹 Automotive Industry Hit by Historic Cyber Threat A recent large-scale cyberattack has shaken the auto-sector, disrupting manufacturing and business continuity. If this can happen to big organizations — what does it mean for SMBs?

    ✅ Learn how to detect and prevent phishing & ransomware attacks ✅ Best practices for protecting your business from AI-related risks ✅ Real-world examples, expert analysis, and actionable security takeaways

    🚨 What You Will Learn

    ✔ The new attack surface created by AI agents ✔ Why traditional security controls fail against modern phishing attacks ✔ How ransomware gangs are evolving faster than organizations ✔ Must-have cybersecurity safeguards to protect business operations and continuity

    🔐 Who Should Watch?
    • SMB Owners & Founders

    • CIOs / CISOs / IT Directors

    • Compliance & Risk Teams

    • Anyone responsible for business continuity or cybersecurity decision-making

    🔔 DON’T FORGET TO:

    👍 Like this video 💬 Comment your questions — we reply to every cybersecurity query 🔔 Subscribe to the channel for weekly cyber threat intelligence & best practices

    Presented by RITC Cybersecurity — Architecture | Operations | GRC | Security Frameworks

    👉 Want to strengthen your cybersecurity program? Book a consultation: https://ritcsecurity.com/

    Afficher plus Afficher moins
    44 min