Épisodes

  • Matthews CyberCraft Threat Intel Briefing - April 15th 2026
    Apr 15 2026

    Today’s highlight: Adobe released a critical zero-day patch for Acrobat Reader — a vulnerability actively exploited in the wild. This isn’t just an update; it’s a race against hackers who can embed malicious code in PDFs to run arbitrary commands on your system. And guess what? It impacts both Windows and Mac users.This kind of threat isn’t on the typical patch schedule. It’s third-party, so it slips past your usual updates unless you’re vigilant. Do you know how many machines in your network have Adobe? Do you have a process to detect and patch these out-of-band vulnerabilities quickly?Here's the real insight: patching isn’t just a tech issue, it’s a cultural one. The faster your team reacts, the less risk you carry. But are your policies and monitoring tools set up for this? Or are you just waiting for the next breach to respond?Worth thinking about. When was your last zero-day patch?#Cybersecurity #ZeroDay #PatchManagement #ThreatIntelligence #InfoSec

    Afficher plus Afficher moins
    21 min
  • Matthews Cybercraft Daily Briefing - 4/7/2026
    Apr 7 2026

    Most cybersecurity lessons come from real breaches and zero-day revelations, but understanding how to respond can be your true competitive edge. When a disgruntled researcher leaks a Windows Defender zero-day called Blue Hammer, it exposes how critical ongoing vigilance and strategic mitigation are—especially when no patch exists yet. Meanwhile, in the AI world, a security breach at startup Mercor threatens industry secrets that underpin major AI models like ChatGPT and Claude, highlighting how sensitive and valuable data security in AI has become.You'll discover how to detect and mitigate zero-day vulnerabilities—why waiting for patches isn't enough, and how to proactively defend your environment. We break down specific tactics such as monitoring endpoint detection tools for unusual privilege escalations, tightening local permissions, and applying enhanced logging to catch anomalous activity. You'll also hear about the importance of staying vigilant with vendor advisories on threats like Blue Hammer, plus practical steps to test mitigations in your own lab environment before they hit production.On the breach front, this episode dives into the ramifications of high-stakes data leaks—not just customer info, but core AI training datasets that power the next generation of AI services. We explore the emerging need for AI security protocols, including advanced hunting, port analysis, and visibility into your company's AI toolset. If you're new to the industry or leading security in your organization, understanding these real-world scenarios will equip you to stay ahead of attackers and protect the most valuable digital assets.Whether you're a cybersecurity professional, a tech leader, or an enthusiast eager to grasp the frontline threats, this episode offers actionable insights to sharpen your strategic edge. Because in today’s landscape, knowing is not enough—it's about how fast and smart you respond that separates the protected from the compromised.Why this works:
    This description hooks the listener with the high-stakes implications of zero-day vulnerabilities and AI data breaches, creating urgency and relevance. It highlights tangible tactics and strategic insights, appealing to both novices and seasoned cybersecurity pros. The focus on real-world examples and practical mitigation steps builds credibility and curiosity, compelling the audience to learn how to better defend their environment.Character count: 3,811/4,000

    Afficher plus Afficher moins
    15 min
  • Matthews Cybercraft Intelligence Briefing - 3/24/2026
    Mar 24 2026

    Cybersecurity failures often happen in ways you wouldn’t expect—like a small device in a vehicle causing a chain reaction that leaves thousands of drivers vulnerable. In this episode, Ed Matthews uncovers a recent cyber attack on ignition interlock systems used by DUI offenders—demonstrating how a backend system shutdown impacted 10% of users, nearly locking drivers out of their vehicles. The lesson? Even seemingly minor components in interconnected systems pose massive security risks if overlooked.You’ll discover why third-party tools and back-end systems are often the weakest links—and how attackers exploit vulnerabilities in these “less visible” parts of your infrastructure. Ed breaks down: the risks of unpatched software, exposure points that can be exploited remotely, and the critical importance of layered security. He shares concrete strategies—from monitoring VM activity to applying security patches efficiently—that every security professional needs to protect complex environments.This episode emphasize


    #Cybersecurity #SecurityLeadership #GRC #SOC #CISO

    Afficher plus Afficher moins
    17 min
  • Matthews Cybercraft Intelligence Briefings - 3/23/2026
    Mar 23 2026

    This podcast focuses on real-world cybersecurity — strategy, defense, SOC operations, governance, and executive leadership.


    No hype.

    No headlines without context.

    No theory without application.


    Just practical cybersecurity built through experience.


    If you work in security leadership, engineering, GRC, or are building toward the CISO path — this is for you.


    #Cybersecurity #SecurityLeadership #GRC #SOC #CISO

    Afficher plus Afficher moins
    21 min
  • Cybercraft Foundations: Zero-Day Deep Dive (Part 1)
    Mar 12 2026

    In this deep dive, Ed Matthews explores the complex world of zero-day vulnerabilities, their detection, management, and the importance of proactive cybersecurity measures. Learn how to track, remediate, and prepare for zero days to protect your organization effectively.

    Keywords

    Zero Day, Cybersecurity, Vulnerabilities, Patch Management, Threat Hunting, Industry Standards, Security Metrics

    Topics

    • Understanding Zero Day Vulnerabilities
    • Detection and Tracking of Zero Days
    • Remediation Strategies and Metrics
    • Industry Standards and Best Practices
    • Future Trends in Zero Day Threats
    • Zero Days Uncovered: How to Detect, Track, and Remediate Threats Effectively
    • Mastering Zero Day Management: A Practical Guide for Security Teams
    • "Zero day is used in the wild before patching."
    • "Waiting 30 days to patch zero days is risky."
    • "Remediation times are often around 18 days."



    Afficher plus Afficher moins
    34 min
  • Matthews Cybercraft Intelligence Briefing - 3/12/2026
    Mar 12 2026

    This episode covers recent cybersecurity updates, including Microsoft's patch release, and explores the escalating cyber threats from Iran amid geopolitical tensions. It emphasizes the importance of strategic resilience and proactive security measures.

    keywords

    cybersecurity, patch Tuesday, Iran cyber threats,infrastructure warfare, data wiping attacks, resilience, cybersecurity strategy


    key topics

    • Microsoft's patch bundle and zero-day vulnerabilities
    • Iranian cyber warfare and infrastructure targeting
    • Recent data wiping attacks on global companies
    • Strategic resilience and management of cybersecurity risks
    • Key Updates and Iran's Escalating Threats
    • How to Prepare for State-Sponsored Cyber Attacks
    • "Apply the latest patches as soon as possible"
    • "Iran is targeting US and global tech infrastructure"
    • "Iranian hackers wiped data from 200,000 systems"

    Afficher plus Afficher moins
    12 min
  • Matthews Cybercraft Intelligence Briefing - 3/6/2026
    Mar 6 2026

    Hosted by Edward Matthews, a cybersecurity leader and educator with over 20 years of experience, this show breaks down modern threats, zero-day response, risk management, SOC operations, governance frameworks, and executive security strategy — without hype or academic fluff.Summary

    This episode covers recent cybersecurity news, zero-day vulnerabilities, and strategic approaches to managing security risks, with a focus on industrial control systems and recent breaches.


    Key Topics

    • Zero-day vulnerabilities and mitigation strategies
    • Rockwell Automation security flaw and exploitation
    • FBI breach of surveillance systems and threat actors
    • Using threat intelligence tools like CISA KEV and Shodan
    • Developing a cybersecurity strategy for industrial environments


    Keywords

    cybersecurity, zero-day, vulnerabilities, industrial control systems, threat intelligence, Rockwell, FBI breach, AWS outage

    Afficher plus Afficher moins
    22 min
  • Matthews Cybercraft – Intelligence Briefing 3/4/2036
    Mar 4 2026

    In this episode of cybersecurity briefing, Edward Matthews covers recent zero-day vulnerabilities, breach analyses, and strategic security practices to help organizations stay protected against evolving threats.


    Keywords

    cybersecurity, zero-day vulnerabilities, data breaches, threat analysis, security strategies

    Afficher plus Afficher moins
    25 min