<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
    <channel>
        <generator>RedCircle VERIFY_TOKEN_b15ae334-bfbc-4063-9d32-55f02fa52a93  -- Rendered At Wed, 20 May 2026 00:25:49 &#43;0000</generator>
        <title>Security Bits</title>
        <link>https://redcircle.com/shows/security-bits</link>
        <language>en</language>
        <copyright>Durgesh Kalya</copyright>
        <itunes:author>Durgesh Kalya</itunes:author>
        <itunes:summary>Have you ever wondered about getting into Cybersecurity or Information Technology? Have you wondered about the latest developments in Industrial Control Systems and Security? If you are open to learning and getting familiar with Information Security and like to get the most unique stories that matter, then Security Bits is the Podcast for you. This Podcast is also available on Video Format on YouTube. Go to https://icsbits.com/simplified for more details.</itunes:summary>
        <podcast:guid>b15ae334-bfbc-4063-9d32-55f02fa52a93</podcast:guid>
        
        <description><![CDATA[<p>Have you ever wondered about getting into Cybersecurity or Information Technology? Have you wondered about the latest developments in Industrial Control Systems and Security? If you are open to learning and getting familiar with Information Security and like to get the most unique stories that matter, then Security Bits is the Podcast for you. This Podcast is also available on Video Format on YouTube. Go to https://icsbits.com/simplified for more details.</p>]]></description>
        
        <itunes:type>episodic</itunes:type>
        <podcast:locked>no</podcast:locked>
        <itunes:owner>
            <itunes:name>Durgesh Kalya</itunes:name>
            <itunes:email>durgesh.bhat@gmail.com</itunes:email>
        </itunes:owner>
        
            
            <itunes:new-feed-url>https://feeds.redcircle.com/b15ae334-bfbc-4063-9d32-55f02fa52a93</itunes:new-feed-url>
            
        
        <itunes:image href="https://media.redcircle.com/images/2022/2/14/2/9f461422-9668-4519-924b-a56a003181e5_be-8ccf583b0a1c_podcast-new-logo-px-square_big.jpg"/>
        
        
        
            
            <itunes:category text="News">

            
                <itunes:category text="Tech News"/>
            

        </itunes:category>
        
            
            <itunes:category text="Education">

            
                <itunes:category text="Self-Improvement"/>
            

        </itunes:category>
        
            
            <itunes:category text="Technology" />

            

        
        
            
            <itunes:category text="Business">

            
                <itunes:category text="Careers"/>
            
                <itunes:category text="Marketing"/>
            

        </itunes:category>
        

        
        <itunes:explicit>no</itunes:explicit>
        
        
        
        
        
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>InfoSec Word of The Day 02 P.A.S.T.A</itunes:title>
                <title>InfoSec Word of The Day 02 P.A.S.T.A</title>

                
                
                <itunes:author>Durgesh Kalya</itunes:author>
                
                <description><![CDATA[<p>InfoSec WOTD is a daily dose of Cybersecurity Terms, Acronyms and Concepts. </p><p>This PASTA is for a different kind of appetite, the one associated with threats aka <a href="https://www.linkedin.com/feed/hashtag/?highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6813441535934283776&keywords=riskappetite" rel="nofollow">#Riskappetite</a>.</p><p>PASTA is a threat modelling methodology to identify threats in a very systematic way. It stands for Process for Attack Simulation and Threat Analysis , a 7 step risk centric method to identify threats.</p><p><a href="https://www.linkedin.com/feed/hashtag/?highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6813129653700608001&keywords=infosecwotd" rel="nofollow">#INFOSECWOTD</a></p>]]></description>
                <content:encoded>&lt;p&gt;InfoSec WOTD is a daily dose of Cybersecurity Terms, Acronyms and Concepts. &lt;/p&gt;&lt;p&gt;This PASTA is for a different kind of appetite, the one associated with threats aka &lt;a href=&#34;https://www.linkedin.com/feed/hashtag/?highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6813441535934283776&amp;keywords=riskappetite&#34; rel=&#34;nofollow&#34;&gt;#Riskappetite&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;PASTA is a threat modelling methodology to identify threats in a very systematic way. It stands for Process for Attack Simulation and Threat Analysis , a 7 step risk centric method to identify threats.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/feed/hashtag/?highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6813129653700608001&amp;keywords=infosecwotd&#34; rel=&#34;nofollow&#34;&gt;#INFOSECWOTD&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="1424404" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/26a761d1-d64b-4f6e-ac7d-5d2e50e86eb8/stream.mp3"/>
                
                <guid isPermaLink="false">f159880a-7e66-419c-b562-2444e212e75b</guid>
                <link>https://icsbits.com/simplified</link>
                <pubDate>Sat, 27 Nov 2021 04:25:29 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/14/2/be764c62-2cca-4ed3-b9d7-494c4f7f36b9_422d9084-4ca6-4cda-a285-1ac36f8297a4_02.jpg"/>
                <itunes:duration>89</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>InfoSec Word of The Day 01 Sneakernet</itunes:title>
                <title>InfoSec Word of The Day 01 Sneakernet</title>

                <itunes:episode>8</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:subtitle>InfoSec WOTD</itunes:subtitle>
                <itunes:summary>InfoSec WOTD is a daily dose of Cybersecurity Terms, Acronyms and Concepts. 

Sneakernet, is an informal term for the transfer of information (data) by use of a physical media such as USB flash drives, optical discs, or external hard drives between computers, rather than transmitting it over a computer network.

#INFOSECWOTD</itunes:summary>
                <description><![CDATA[<p>InfoSec WOTD is a daily dose of Cybersecurity Terms, Acronyms and Concepts. </p><p>Sneakernet, is an informal term for the transfer of information (data) by use of a physical media such as USB flash drives, optical discs, or external hard drives between computers, rather than transmitting it over a computer network.</p><p><a href="https://www.linkedin.com/feed/hashtag/?highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6813129653700608001&keywords=infosecwotd" rel="nofollow">#INFOSECWOTD</a></p>]]></description>
                <content:encoded>&lt;p&gt;InfoSec WOTD is a daily dose of Cybersecurity Terms, Acronyms and Concepts. &lt;/p&gt;&lt;p&gt;Sneakernet, is an informal term for the transfer of information (data) by use of a physical media such as USB flash drives, optical discs, or external hard drives between computers, rather than transmitting it over a computer network.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/feed/hashtag/?highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6813129653700608001&amp;keywords=infosecwotd&#34; rel=&#34;nofollow&#34;&gt;#INFOSECWOTD&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="1016058" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/5cc3d474-d5e2-4cb3-b841-a54431f2dcf4/stream.mp3"/>
                
                <guid isPermaLink="false">1dd2cc0d-9260-453c-a19f-57938690bde0</guid>
                <link>https://icsbits.com/word/</link>
                <pubDate>Fri, 09 Jul 2021 20:41:39 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/14/2/1ae4d15a-cf9d-40a3-9c52-b845fb5483b4_bc45d4_6fd00a8b-2f27-42f4-a2d8-b039542acca7_01.jpg"/>
                <itunes:duration>63</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Florida Water Treatment Plant Hacked, Chrome Browser Vulnerability, Security Researchers were targeted, Social Media Etiquette, CISCO’s VPN Flaws, Happy Safe Internet Day and more!</itunes:title>
                <title>Florida Water Treatment Plant Hacked, Chrome Browser Vulnerability, Security Researchers were targeted, Social Media Etiquette, CISCO’s VPN Flaws, Happy Safe Internet Day and more!</title>

                <itunes:episode>7</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Durgesh Kalya</itunes:author>
                
                <description><![CDATA[<p><span>Hello and welcome to Simplified Security bits Episode Number 7. I am your host, Durgesh and today is Feb 9th 2021, coming to you straight from Houston Texas. </span></p><p><br></p><p><span>Today is Safe Internet Day. Celebrated around the world. In the US, you can find more information for more information on how you can get involved and spread the word by going to </span><a href="https://saferinternetday.us/" rel="nofollow">https://saferinternetday.us/</a></p><p><br></p><p><span>Tags: Podcast, Cybersecurity Podcast, Durgesh Kalya, Simplified Security, </span></p><p><br></p><p><br></p><p><span>The Florida Water Treatment Plant was hacked and the attacker managed to increase the amount of Sodium Hydroxide levels from 100 parts per million to 11,100 parts per million. The attacker was able to compromise the remote access system and managed to change parameters for the lye component. This is the worst case scenario for Industrial Control Systems which could have led to a dangerous situation. An operator was able to spot the increase in levels and was able to turn it down. </span></p><p><br></p><p><a href="https://www.nbcnews.com/tech/security/florida-near-miss-cybersecurity-worst-case-scenario-n1257091" rel="nofollow">https://www.nbcnews.com/tech/security/florida-near-miss-cybersecurity-worst-case-scenario-n1257091</a></p><p><br></p><p><span>Project Zero Team at Google have found a zero day bug on Chrome, Which is being actively exploited and you need to update your browser now. Both Chrome and Edge browsers use the Chromium Engine. So patch now. Simply go to your browser, and click About to initiate the update. </span></p><p><a href="https://nakedsecurity.sophos.com/2021/02/05/chrome-zero-day-browser-bug-found-patch-now/" rel="nofollow">https://nakedsecurity.sophos.com/2021/02/05/chrome-zero-day-browser-bug-found-patch-now/</a><span> </span></p><p><br></p><p><br></p><p><span>Cisco reported several vulnerabilities which are tracked in various CVEs. The vulnerabilities allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. Patch them Routers Now!</span></p><p><span> </span></p><p><a href="https://thehackernews.com/2021/02/critical-flaws-reported-in-cisco-vpn.html" rel="nofollow">https://thehackernews.com/2021/02/critical-flaws-reported-in-cisco-vpn.html</a><span> </span></p><p><br></p><p><br></p><p><br></p><p><span>Google bans the Spanish Certificate Authority (CA) -Camerfirma. CAs In cryptography are certification authority is an entity that issues digital certificates. While this is nothing new, in the past major browsers have issued warnings and requested CAs to fix issues with verification and validation of certificates. The result is that the websites and services that use certificates that were issued by Camerfirma will start to get flagged on Chrome browsers and will start showing a Certificate Error with the release of the new browser version Chrome 90 which will be available in April of 2021.</span></p><p><a href="https://www.zdnet.com/article/google-bans-another-misbehaving-ca-from-chrome/" rel="nofollow">https://www.zdnet.com/article/google-bans-another-misbehaving-ca-from-chrome/</a></p><p><br></p><p><br></p><p><span>Google and Microsoft have reported various instances of ongoing attacks on security researchers. Microsoft has outlined the threat actors behind this targeted attack in their security blog. They attribute the attacks to a group called ZINC. More information is in the show notes. </span></p><p><br></p><p><a href="https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/" rel="nofollow">https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/</a></p><p><br></p><p><span>Facebook etiquette:</span></p><p><br></p><p><span>I am always keen to learn more about how one can improve our interactions and behaviors that can benefit the society as a whole. When it is really at a click of a button you can send communication across the wire and increasingly with very little thought or consequence. As today is Safe Internet Day, I wanted to feature an article written by ESET security blogger Amer Owaida. He very beautifully outlines some of the strategies to apply to strengthen your privacy, security and most importantly to remember the famous Vegas Line,  what happens on the internet stays on the internet. Link is in the show notes.</span></p><p><br></p><p><a href="https://www.welivesecurity.com/2021/02/04/facebook-etiquette-behaviors-avoid/" rel="nofollow">https://www.welivesecurity.com/2021/02/04/facebook-etiquette-behaviors-avoid/</a></p><p><br></p><p><span>That is it for this episode.</span></p><p><span>Please provide me your feedback by reaching out on my twitter </span><strong>@durgeshkalya</strong><span>. All the links to anything I have discussed in this episode is in the show notes of this podcast.</span></p><p><span>Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.</span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Hello and welcome to Simplified Security bits Episode Number 7. I am your host, Durgesh and today is Feb 9th 2021, coming to you straight from Houston Texas. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Today is Safe Internet Day. Celebrated around the world. In the US, you can find more information for more information on how you can get involved and spread the word by going to &lt;/span&gt;&lt;a href=&#34;https://saferinternetday.us/&#34; rel=&#34;nofollow&#34;&gt;https://saferinternetday.us/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Tags: Podcast, Cybersecurity Podcast, Durgesh Kalya, Simplified Security, &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The Florida Water Treatment Plant was hacked and the attacker managed to increase the amount of Sodium Hydroxide levels from 100 parts per million to 11,100 parts per million. The attacker was able to compromise the remote access system and managed to change parameters for the lye component. This is the worst case scenario for Industrial Control Systems which could have led to a dangerous situation. An operator was able to spot the increase in levels and was able to turn it down. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.nbcnews.com/tech/security/florida-near-miss-cybersecurity-worst-case-scenario-n1257091&#34; rel=&#34;nofollow&#34;&gt;https://www.nbcnews.com/tech/security/florida-near-miss-cybersecurity-worst-case-scenario-n1257091&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Project Zero Team at Google have found a zero day bug on Chrome, Which is being actively exploited and you need to update your browser now. Both Chrome and Edge browsers use the Chromium Engine. So patch now. Simply go to your browser, and click About to initiate the update. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com/2021/02/05/chrome-zero-day-browser-bug-found-patch-now/&#34; rel=&#34;nofollow&#34;&gt;https://nakedsecurity.sophos.com/2021/02/05/chrome-zero-day-browser-bug-found-patch-now/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco reported several vulnerabilities which are tracked in various CVEs. The vulnerabilities allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. Patch them Routers Now!&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://thehackernews.com/2021/02/critical-flaws-reported-in-cisco-vpn.html&#34; rel=&#34;nofollow&#34;&gt;https://thehackernews.com/2021/02/critical-flaws-reported-in-cisco-vpn.html&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Google bans the Spanish Certificate Authority (CA) -Camerfirma. CAs In cryptography are certification authority is an entity that issues digital certificates. While this is nothing new, in the past major browsers have issued warnings and requested CAs to fix issues with verification and validation of certificates. The result is that the websites and services that use certificates that were issued by Camerfirma will start to get flagged on Chrome browsers and will start showing a Certificate Error with the release of the new browser version Chrome 90 which will be available in April of 2021.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.zdnet.com/article/google-bans-another-misbehaving-ca-from-chrome/&#34; rel=&#34;nofollow&#34;&gt;https://www.zdnet.com/article/google-bans-another-misbehaving-ca-from-chrome/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Google and Microsoft have reported various instances of ongoing attacks on security researchers. Microsoft has outlined the threat actors behind this targeted attack in their security blog. They attribute the attacks to a group called ZINC. More information is in the show notes. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/&#34; rel=&#34;nofollow&#34;&gt;https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Facebook etiquette:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;I am always keen to learn more about how one can improve our interactions and behaviors that can benefit the society as a whole. When it is really at a click of a button you can send communication across the wire and increasingly with very little thought or consequence. As today is Safe Internet Day, I wanted to feature an article written by ESET security blogger Amer Owaida. He very beautifully outlines some of the strategies to apply to strengthen your privacy, security and most importantly to remember the famous Vegas Line,  what happens on the internet stays on the internet. Link is in the show notes.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.welivesecurity.com/2021/02/04/facebook-etiquette-behaviors-avoid/&#34; rel=&#34;nofollow&#34;&gt;https://www.welivesecurity.com/2021/02/04/facebook-etiquette-behaviors-avoid/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;That is it for this episode.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Please provide me your feedback by reaching out on my twitter &lt;/span&gt;&lt;strong&gt;@durgeshkalya&lt;/strong&gt;&lt;span&gt;. All the links to anything I have discussed in this episode is in the show notes of this podcast.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="4629733" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/87e0f6e5-01c2-44d7-9e37-8763ba5937d2/stream.mp3"/>
                
                <guid isPermaLink="false">79a65eb6-59b7-4d2b-a884-d5c930d32093</guid>
                <link>https://icsbits.com/simplified</link>
                <pubDate>Tue, 09 Feb 2021 09:01:43 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/2/9/9/74d69c22-f24d-4d8e-839c-ef4b634d4867_custom_dimensions_3000x3000_px.jpg"/>
                <itunes:duration>289</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Covid 19 Vaccine Info Leaks, Siemens releases multiple vulnerabilities, Ubiquiti tells its users to secure their account and more!</itunes:title>
                <title>Covid 19 Vaccine Info Leaks, Siemens releases multiple vulnerabilities, Ubiquiti tells its users to secure their account and more!</title>

                <itunes:episode>6</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Durgesh Kalya</itunes:author>
                
                <description><![CDATA[<p><span>Simplified Security - E6 - Covid 19 Vaccine Info Leaks, Siemens releases multiple vulnerabilities, Ubiquiti tells its users to secure their account and more!</span></p><p><br></p><p><br></p><p><strong>Headlines:</strong></p><p><span>Leaked information surfaces from the December attack on European Medicines Agency on COVID-19 Vaccine.</span></p><p><br></p><p><strong>EMA Original Post:</strong></p><p><a href="https://www.ema.europa.eu/en/news/cyberattack-european-medicines-agency" rel="nofollow">https://www.ema.europa.eu/en/news/cyberattack-european-medicines-agency</a></p><p><br></p><p><strong>Bleeping Computer’s Post</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-leak-stolen-pfizer-covid-19-vaccine-data-online/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hackers-leak-stolen-pfizer-covid-19-vaccine-data-online/</a><span> </span></p><p><br></p><p><span>Siemens releases multiple Vulnerabilities in Web Server for Scalance X Products and Solid Edge.</span></p><p><br></p><p><strong>Siemens Scalance X Advisory:</strong></p><p><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" rel="nofollow">https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf</a><span> </span></p><p><br></p><p><strong>Siemens Solid Edge Advisory:</strong></p><p><a href="https://cert-portal.siemens.com/productcert/txt/ssa-979834.txt" rel="nofollow">https://cert-portal.siemens.com/productcert/txt/ssa-979834.txt</a><span> </span></p><p><br></p><p><br></p><p><strong>SEPA, Scottish Environment Protection Agency attacked on Christmas Eve.</strong></p><p><br></p><p><a href="https://www.sepa.org.uk/about-us/cyber-attack/" rel="nofollow">https://www.sepa.org.uk/about-us/cyber-attack/</a><span> </span></p><p><br></p><p><strong>Ubiquiti News,  </strong></p><p><a href="https://community.ui.com/questions/Account-Notification/96467115-49b5-4dd6-9517-f8cdbf6906f3" rel="nofollow">https://community.ui.com/questions/Account-Notification/96467115-49b5-4dd6-9517-f8cdbf6906f3</a><span> </span></p><p><br></p><p><strong>Naked Security article for Homeschooling and how to stay secure. </strong><a href="https://nakedsecurity.sophos.com/2021/01/13/home-schooling-how-to-stay-secure/" rel="nofollow">https://nakedsecurity.sophos.com/2021/01/13/home-schooling-how-to-stay-secure/</a><span> </span></p><p><br></p><p><strong>Symantec, Threat Intelligence Blog article on Solar Winds Attack.</strong></p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence" rel="nofollow">https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence</a><span> </span></p><p><br></p><p><span>---</span></p><p><br></p><p><strong>Connect with me:</strong></p><p><span>Simply follow me on </span><a href="https://www.linkedin.com/in/durgeshkalya/" rel="nofollow">LinkedIn</a><span> or </span><a href="https://twitter.com/durgeshkalya" rel="nofollow">Twitter</a><strong>.</strong></p><p><br></p><p><strong>Subscribe to my Podcast Simplified Security:</strong></p><p><span>Google Podcast</span></p><p><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA" rel="nofollow">https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA</a><span> </span></p><p><br></p><p><span>Apple Podcast</span></p><p><a href="https://podcasts.apple.com/us/podcast/security-bits/id1542309317" rel="nofollow">https://podcasts.apple.com/us/podcast/security-bits/id1542309317</a><span> </span></p><p><br></p><p><span>For all other platforms such as Spotify, TuneIn, Amazon,</span></p><p><span>Go to  </span><a href="https://icsbits.com/simplified/" rel="nofollow">https://icsbits.com/simplified/</a><span> </span></p><p><br></p><p><span>Do not forget to Subscribe to my YouTube Channel and Enable Notifications:</span></p><p><a href="https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1" rel="nofollow">https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1</a><span> </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Simplified Security - E6 - Covid 19 Vaccine Info Leaks, Siemens releases multiple vulnerabilities, Ubiquiti tells its users to secure their account and more!&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Headlines:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Leaked information surfaces from the December attack on European Medicines Agency on COVID-19 Vaccine.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;EMA Original Post:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.ema.europa.eu/en/news/cyberattack-european-medicines-agency&#34; rel=&#34;nofollow&#34;&gt;https://www.ema.europa.eu/en/news/cyberattack-european-medicines-agency&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Bleeping Computer’s Post&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/hackers-leak-stolen-pfizer-covid-19-vaccine-data-online/&#34; rel=&#34;nofollow&#34;&gt;https://www.bleepingcomputer.com/news/security/hackers-leak-stolen-pfizer-covid-19-vaccine-data-online/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Siemens releases multiple Vulnerabilities in Web Server for Scalance X Products and Solid Edge.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Siemens Scalance X Advisory:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf&#34; rel=&#34;nofollow&#34;&gt;https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Siemens Solid Edge Advisory:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://cert-portal.siemens.com/productcert/txt/ssa-979834.txt&#34; rel=&#34;nofollow&#34;&gt;https://cert-portal.siemens.com/productcert/txt/ssa-979834.txt&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SEPA, Scottish Environment Protection Agency attacked on Christmas Eve.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.sepa.org.uk/about-us/cyber-attack/&#34; rel=&#34;nofollow&#34;&gt;https://www.sepa.org.uk/about-us/cyber-attack/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Ubiquiti News,  &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://community.ui.com/questions/Account-Notification/96467115-49b5-4dd6-9517-f8cdbf6906f3&#34; rel=&#34;nofollow&#34;&gt;https://community.ui.com/questions/Account-Notification/96467115-49b5-4dd6-9517-f8cdbf6906f3&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Naked Security article for Homeschooling and how to stay secure. &lt;/strong&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com/2021/01/13/home-schooling-how-to-stay-secure/&#34; rel=&#34;nofollow&#34;&gt;https://nakedsecurity.sophos.com/2021/01/13/home-schooling-how-to-stay-secure/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Symantec, Threat Intelligence Blog article on Solar Winds Attack.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence&#34; rel=&#34;nofollow&#34;&gt;https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;---&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Simply follow me on &lt;/span&gt;&lt;a href=&#34;https://www.linkedin.com/in/durgeshkalya/&#34; rel=&#34;nofollow&#34;&gt;LinkedIn&lt;/a&gt;&lt;span&gt; or &lt;/span&gt;&lt;a href=&#34;https://twitter.com/durgeshkalya&#34; rel=&#34;nofollow&#34;&gt;Twitter&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Subscribe to my Podcast Simplified Security:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Google Podcast&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Apple Podcast&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://podcasts.apple.com/us/podcast/security-bits/id1542309317&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.apple.com/us/podcast/security-bits/id1542309317&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;For all other platforms such as Spotify, TuneIn, Amazon,&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Go to  &lt;/span&gt;&lt;a href=&#34;https://icsbits.com/simplified/&#34; rel=&#34;nofollow&#34;&gt;https://icsbits.com/simplified/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Do not forget to Subscribe to my YouTube Channel and Enable Notifications:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="4823249" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/c14bfe72-10d4-4dd3-87b9-5a2a4d20cb81/stream.mp3"/>
                
                <guid isPermaLink="false">4ec1ea87-ce48-4065-9e2e-9d1505fa63e8</guid>
                <link>https://icsbits.com/simplified</link>
                <pubDate>Sat, 23 Jan 2021 11:01:53 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/23/11/2666801f-9ad6-43a0-a566-bbf098ae9372_custom_dimensions_3000x3000_px.jpg"/>
                <itunes:duration>301</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Simplified Security Bits - Ticketmaster agrees to pay $10 million to Crowdsurge, Microsoft release details on SolarWinds Hack, Veritas released a handful of CVEs and Free Boot camp for CISSP Candidates and more!</itunes:title>
                <title>Simplified Security Bits - Ticketmaster agrees to pay $10 million to Crowdsurge, Microsoft release details on SolarWinds Hack, Veritas released a handful of CVEs and Free Boot camp for CISSP Candidates and more!</title>

                <itunes:episode>5</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Durgesh Kalya</itunes:author>
                
                <description><![CDATA[<p><strong>Public document from the court TicketMaster Lawsuit:</strong></p><p><a href="https://www.justice.gov/usao-edny/pr/ticketmaster-pays-10-million-criminal-fine-intrusions-competitor-s-computer-systems-0" rel="nofollow">https://www.justice.gov/usao-edny/pr/ticketmaster-pays-10-million-criminal-fine-intrusions-competitor-s-computer-systems-0</a> </p><p><br></p><p><strong>What is Egregor?</strong></p><p><a href="https://www.trendmicro.com/en_us/research/20/l/egregor-ransomware-launches-string-of-high-profile-attacks-to-en.html" rel="nofollow">https://www.trendmicro.com/en_us/research/20/l/egregor-ransomware-launches-string-of-high-profile-attacks-to-en.html</a> </p><p><br></p><p><strong>Veritas Advisory:</strong></p><p><a href="https://www.veritas.com/content/support/en_US/security" rel="nofollow">https://www.veritas.com/content/support/en_US/security</a></p><p><br></p><p><strong>SANs institute is offering a Free Virtual Summit:</strong></p><p><a href="https://www.sans.org/event/ics-security-summit-2021?utm_campaign=SANS+Solution+Forum+Vendor&utm_content=ICS+Summit+Training+December+2020&utm_medium=Social&utm_source=LinkedIn" rel="nofollow">https://www.sans.org/event/ics-security-summit-2021?utm_medium=Social&amp;utm_source=LinkedIn&amp;utm_content=ICS+Summit+Training+December+2020&amp;utm_campaign=SANS+Solution+Forum+Vendor</a></p><p><br></p><p><strong>Join the Certification Station Discord Group here:</strong></p><p><a href="https://discord.gg/cD2EgtyQ" rel="nofollow">https://discord.gg/cD2EgtyQ</a></p><p><br></p><p><strong>New to Discord and this community? Check out this video to get started::</strong></p><p><a href="https://youtu.be/le_CE--Mnvs" rel="nofollow">https://youtu.be/le_CE--Mnvs</a> </p><p><br></p><p>---</p><p><br></p><p><strong>Connect with me:</strong></p><p>Simply follow me on <a href="https://www.linkedin.com/in/durgeshkalya/" rel="nofollow">LinkedIn</a> or <a href="https://twitter.com/durgeshkalya" rel="nofollow">Twitter</a><strong>.</strong></p><p><br></p><p><strong>Subscribe to my Podcast Simplified Security:</strong></p><p>Google Podcast</p><p><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA" rel="nofollow">https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA</a> </p><p><br></p><p>Apple Podcast</p><p><a href="https://podcasts.apple.com/us/podcast/security-bits/id1542309317" rel="nofollow">https://podcasts.apple.com/us/podcast/security-bits/id1542309317</a> </p><p><br></p><p>For all other platforms such as Spotify, Tune IN, Amazon,</p><p>Go to <a href="https://icsbits.com/simplified/" rel="nofollow">https://icsbits.com/simplified/</a> </p><p><br></p><p>Do not forget to Subscribe to my YouTube Channel and Enable Notifications:</p><p><a href="https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1" rel="nofollow">https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Public document from the court TicketMaster Lawsuit:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.justice.gov/usao-edny/pr/ticketmaster-pays-10-million-criminal-fine-intrusions-competitor-s-computer-systems-0&#34; rel=&#34;nofollow&#34;&gt;https://www.justice.gov/usao-edny/pr/ticketmaster-pays-10-million-criminal-fine-intrusions-competitor-s-computer-systems-0&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What is Egregor?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.trendmicro.com/en_us/research/20/l/egregor-ransomware-launches-string-of-high-profile-attacks-to-en.html&#34; rel=&#34;nofollow&#34;&gt;https://www.trendmicro.com/en_us/research/20/l/egregor-ransomware-launches-string-of-high-profile-attacks-to-en.html&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Veritas Advisory:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.veritas.com/content/support/en_US/security&#34; rel=&#34;nofollow&#34;&gt;https://www.veritas.com/content/support/en_US/security&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SANs institute is offering a Free Virtual Summit:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.sans.org/event/ics-security-summit-2021?utm_campaign=SANS&#43;Solution&#43;Forum&#43;Vendor&amp;utm_content=ICS&#43;Summit&#43;Training&#43;December&#43;2020&amp;utm_medium=Social&amp;utm_source=LinkedIn&#34; rel=&#34;nofollow&#34;&gt;https://www.sans.org/event/ics-security-summit-2021?utm_medium=Social&amp;amp;utm_source=LinkedIn&amp;amp;utm_content=ICS&#43;Summit&#43;Training&#43;December&#43;2020&amp;amp;utm_campaign=SANS&#43;Solution&#43;Forum&#43;Vendor&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Join the Certification Station Discord Group here:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://discord.gg/cD2EgtyQ&#34; rel=&#34;nofollow&#34;&gt;https://discord.gg/cD2EgtyQ&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;New to Discord and this community? Check out this video to get started::&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://youtu.be/le_CE--Mnvs&#34; rel=&#34;nofollow&#34;&gt;https://youtu.be/le_CE--Mnvs&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;---&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Simply follow me on &lt;a href=&#34;https://www.linkedin.com/in/durgeshkalya/&#34; rel=&#34;nofollow&#34;&gt;LinkedIn&lt;/a&gt; or &lt;a href=&#34;https://twitter.com/durgeshkalya&#34; rel=&#34;nofollow&#34;&gt;Twitter&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Subscribe to my Podcast Simplified Security:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Google Podcast&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Apple Podcast&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://podcasts.apple.com/us/podcast/security-bits/id1542309317&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.apple.com/us/podcast/security-bits/id1542309317&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;For all other platforms such as Spotify, Tune IN, Amazon,&lt;/p&gt;&lt;p&gt;Go to &lt;a href=&#34;https://icsbits.com/simplified/&#34; rel=&#34;nofollow&#34;&gt;https://icsbits.com/simplified/&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Do not forget to Subscribe to my YouTube Channel and Enable Notifications:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="10459010" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/5f52cb21-7a24-4765-9d4d-d2e6a6498f71/stream.mp3"/>
                
                <guid isPermaLink="false">59cb6d04-2192-4d77-aba9-d4d57388ccbe</guid>
                <link>https://icsbits.com/simplified</link>
                <pubDate>Thu, 07 Jan 2021 09:44:58 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/7/9/fd5d4325-e708-4d74-81ab-4afbd887f432_c8be09d0-ba01-4f2a-bb2d-63bbc1d4e6d5_custom_dimensions_3000x3000_px.jpg"/>
                <itunes:duration>653</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Expert in Security - Full Featured Interview with Marco Ayala on various ICS Cybersecurity Topics</itunes:title>
                <title>Expert in Security - Full Featured Interview with Marco Ayala on various ICS Cybersecurity Topics</title>

                <itunes:episode>3</itunes:episode>
                
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:summary>Very excited to share with you our cybersecurty community an interview with ICS Cybersecurity Expert Marco Ayala (Twitter: @ics_scada)&amp;nbsp;
We discuss various topics, such as how he got started, why defense in depth is criticle in Industrial systems and my favorite, #snickernet using USB drives in ICS.&amp;nbsp;

00:10 - Introduction to Marco Ayala
02:45 - What is your story and how did you get into Industrial Control Systems Security?
14:01 - What are your thoughts on Virtualization in OT Environments?&amp;nbsp;
17:48 - What are the key elements of an OT Incident Response Plan
22:58 - What is InfraGard?
26:49 - FSO and Cybersecurity Awareness&amp;nbsp;&amp;nbsp;&amp;nbsp;
33:12 - What is the place of USB Drives in OT Environment?&amp;nbsp;</itunes:summary>
                <description><![CDATA[<p>Very excited to share with you our cybersecurty community an interview with ICS Cybersecurity Expert Marco Ayala (Twitter: @ics_scada) </p><p>We discuss various topics, such as how he got started, why defense in depth is criticle in Industrial systems and my favorite, #snickernet using USB drives in ICS. </p><p>00:10 - Introduction to Marco Ayala</p><p>02:45 - What is your story and how did you get into Industrial Control Systems Security?</p><p>14:01 - What are your thoughts on Virtualization in OT Environments? </p><p>17:48 - What are the key elements of an OT Incident Response Plan</p><p>22:58 - What is InfraGard?</p><p>26:49 - FSO and Cybersecurity Awareness   </p><p>33:12 - What is the place of USB Drives in OT Environment? </p>]]></description>
                <content:encoded>&lt;p&gt;Very excited to share with you our cybersecurty community an interview with ICS Cybersecurity Expert Marco Ayala (Twitter: @ics_scada) &lt;/p&gt;&lt;p&gt;We discuss various topics, such as how he got started, why defense in depth is criticle in Industrial systems and my favorite, #snickernet using USB drives in ICS. &lt;/p&gt;&lt;p&gt;00:10 - Introduction to Marco Ayala&lt;/p&gt;&lt;p&gt;02:45 - What is your story and how did you get into Industrial Control Systems Security?&lt;/p&gt;&lt;p&gt;14:01 - What are your thoughts on Virtualization in OT Environments? &lt;/p&gt;&lt;p&gt;17:48 - What are the key elements of an OT Incident Response Plan&lt;/p&gt;&lt;p&gt;22:58 - What is InfraGard?&lt;/p&gt;&lt;p&gt;26:49 - FSO and Cybersecurity Awareness   &lt;/p&gt;&lt;p&gt;33:12 - What is the place of USB Drives in OT Environment? &lt;/p&gt;</content:encoded>
                
                <enclosure length="47632718" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/6987bc37-feab-4233-9d08-0d69669ec683/stream.mp3"/>
                
                <guid isPermaLink="false">991aea4f-363a-4c9f-aca4-1b7c9a140bef</guid>
                <link>https://securitybits.sounder.fm</link>
                <pubDate>Fri, 25 Dec 2020 14:41:27 &#43;0000</pubDate>
                <itunes:duration>2977</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Simplified Security - Supply Chain Bust with Sunburst, Interview with Marco Ayala, Cybersecurity Expert where we discuss several different topics from his humble beginnings in Industrial Control Systems Security, USB Drive in ICS Environment and International Society of Automation and their certification and training.</itunes:title>
                <title>Simplified Security - Supply Chain Bust with Sunburst, Interview with Marco Ayala, Cybersecurity Expert where we discuss several different topics from his humble beginnings in Industrial Control Systems Security, USB Drive in ICS Environment and International Society of Automation and their certification and training.</title>

                <itunes:episode>3</itunes:episode>
                
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:summary>Simplified Security - E3 - Supply Chain Bust with Sunburst, Interview with Marco Ayala, Cybersecurity Expert where we discuss several different topics from his humble beginnings in Industrial Control Systems Security, USB Drive in ICS Environment &amp;amp; More!
Full Interview with Marco is on YouTube Ayala https://youtu.be/gdfftCZEn28 &amp;nbsp;
Folllow Marc on Twitter: @ICS_SCADA
Many of the Solarwinds products are built on this common technology platform, the SolarWinds® Orion which enables an organization, their customers to implement their various products whether individually or as a group.  This makes it possible for their customers to have a single dashboard or a management for the products they have implemented. While there are certain solarwinds products that do not leverage this platform, their security advisory shows about 18 products. Some of which include
IP Address Manager (IPAM)
Log Analyzer (LA)
Network Automation Manager (NAM)
Network Configuration Manager (NCM)
Network Performance Monitor (NPM)
Etc. 
For a full list of affected products, check the link https://www.solarwinds.com/securityadvisory 
Microsoft &amp;amp; FireEye are continuing to investigate the solarwind hack, which they call Solorigate, Sunburst Backdoor respectively. For more information check out Microsoft’s and FireEye’s Security Blogs, links are in the description. 
https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html 
Special Feature: Expert in Security Interview with Marco Ayala, Cybersecurity Expert.
Please provide me your feedback by reaching out on my twitter @durgeshkalya. All the links to anything I have discussed in this episode is in the descriptions of this podcast.
Make sure you subscribe to simplified security episodes available as podcast and on youtube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or youtube, until then be safe and think before you click.</itunes:summary>
                <description><![CDATA[<p>Simplified Security - E3 - Supply Chain Bust with Sunburst, Interview with Marco Ayala, Cybersecurity Expert where we discuss several different topics from his humble beginnings in Industrial Control Systems Security, USB Drive in ICS Environment &amp; More!</p><p>Full Interview with Marco is on YouTube Ayala <a href="https://youtu.be/gdfftCZEn28" rel="nofollow">https://youtu.be/gdfftCZEn28</a> </p><p>Folllow Marc on Twitter: <a href="https://twitter.com/ICS_SCADA" rel="nofollow">@ICS_SCADA</a></p><p>Many of the Solarwinds products are built on this common technology platform, the SolarWinds® Orion which enables an organization, their customers to implement their various products whether individually or as a group. This makes it possible for their customers to have a single dashboard or a management for the products they have implemented. While there are certain solarwinds products that do not leverage this platform, their security advisory shows about 18 products. Some of which include</p><p>IP Address Manager (IPAM)</p><p>Log Analyzer (LA)</p><p>Network Automation Manager (NAM)</p><p>Network Configuration Manager (NCM)</p><p>Network Performance Monitor (NPM)</p><p>Etc.</p><p>For a full list of affected products, check the link <a href="https://www.solarwinds.com/securityadvisory" rel="nofollow">https://www.solarwinds.com/securityadvisory</a></p><p><br></p><p>Microsoft &amp; FireEye are continuing to investigate the solarwind hack, which they call Solorigate, Sunburst Backdoor respectively. For more information check out Microsoft’s and FireEye’s Security Blogs, links are in the description.</p><p><a href="https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/" rel="nofollow">https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/</a></p><p><a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" rel="nofollow">https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html</a></p><p>Special Feature: Expert in Security Interview with Marco Ayala, Cybersecurity Expert.</p><p>Please provide me your feedback by reaching out on my twitter @durgeshkalya. All the links to anything I have discussed in this episode is in the descriptions of this podcast.</p><p>Make sure you subscribe to simplified security episodes available as podcast and on youtube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or youtube, until then be safe and think before you click.</p>]]></description>
                <content:encoded>&lt;p&gt;Simplified Security - E3 - Supply Chain Bust with Sunburst, Interview with Marco Ayala, Cybersecurity Expert where we discuss several different topics from his humble beginnings in Industrial Control Systems Security, USB Drive in ICS Environment &amp;amp; More!&lt;/p&gt;&lt;p&gt;Full Interview with Marco is on YouTube Ayala &lt;a href=&#34;https://youtu.be/gdfftCZEn28&#34; rel=&#34;nofollow&#34;&gt;https://youtu.be/gdfftCZEn28&lt;/a&gt; &lt;/p&gt;&lt;p&gt;Folllow Marc on Twitter: &lt;a href=&#34;https://twitter.com/ICS_SCADA&#34; rel=&#34;nofollow&#34;&gt;@ICS_SCADA&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Many of the Solarwinds products are built on this common technology platform, the SolarWinds® Orion which enables an organization, their customers to implement their various products whether individually or as a group. This makes it possible for their customers to have a single dashboard or a management for the products they have implemented. While there are certain solarwinds products that do not leverage this platform, their security advisory shows about 18 products. Some of which include&lt;/p&gt;&lt;p&gt;IP Address Manager (IPAM)&lt;/p&gt;&lt;p&gt;Log Analyzer (LA)&lt;/p&gt;&lt;p&gt;Network Automation Manager (NAM)&lt;/p&gt;&lt;p&gt;Network Configuration Manager (NCM)&lt;/p&gt;&lt;p&gt;Network Performance Monitor (NPM)&lt;/p&gt;&lt;p&gt;Etc.&lt;/p&gt;&lt;p&gt;For a full list of affected products, check the link &lt;a href=&#34;https://www.solarwinds.com/securityadvisory&#34; rel=&#34;nofollow&#34;&gt;https://www.solarwinds.com/securityadvisory&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Microsoft &amp;amp; FireEye are continuing to investigate the solarwind hack, which they call Solorigate, Sunburst Backdoor respectively. For more information check out Microsoft’s and FireEye’s Security Blogs, links are in the description.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/&#34; rel=&#34;nofollow&#34;&gt;https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html&#34; rel=&#34;nofollow&#34;&gt;https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Special Feature: Expert in Security Interview with Marco Ayala, Cybersecurity Expert.&lt;/p&gt;&lt;p&gt;Please provide me your feedback by reaching out on my twitter @durgeshkalya. All the links to anything I have discussed in this episode is in the descriptions of this podcast.&lt;/p&gt;&lt;p&gt;Make sure you subscribe to simplified security episodes available as podcast and on youtube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or youtube, until then be safe and think before you click.&lt;/p&gt;</content:encoded>
                
                <enclosure length="14368600" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/67633f6a-80c8-4d62-b02f-84bb1b1e42e1/stream.mp3"/>
                
                <guid isPermaLink="false">0d4c20bc-9bc9-4536-ae03-50cbacdd3fb5</guid>
                <link>https://securitybits.sounder.fm</link>
                <pubDate>Mon, 21 Dec 2020 19:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/7/9/5742f713-f77e-4cf6-b8e7-e4bce35d951b_2cd47595-a9fe-4484-9e39-f2d4c674fbd6_podcast-thumbnil-square_big.jpg"/>
                <itunes:duration>898</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Simplified Security - Google Play Core Library Code Execution Vulnerability, Trickbot Evolves to new low levels and Fireeye Breached More!</itunes:title>
                <title>Simplified Security - Google Play Core Library Code Execution Vulnerability, Trickbot Evolves to new low levels and Fireeye Breached More!</title>

                <itunes:episode>2</itunes:episode>
                
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:summary>Hello and welcome to Simplified Security Episode Number 2.
Links:

Vulnerability in Google Play Core Library:
https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/&amp;nbsp;
TrickBot Malware gets a creepy feature:
https://www.advanced-intel.com/post/persist-brick-profit-trickbot-offers-new-trickboot-uefi-focused-functionality&amp;nbsp;
CVE-2020-8539.
https://nvd.nist.gov/vuln/detail/CVE-2020-8539
Kia Motors Head Unit CVE:
Italian National Research Council Research Paper:
https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf&amp;nbsp;
What When and Why In Security:
Windows 98 End of Life
https://www.informationweek.com/windows-98-presents-security-problems-as-it-ends-lifespan/d/d-id/1022187?piddl_msgorder=asc&amp;nbsp;
Please provide me your feedback by reaching out on my twitter @durgeshkalya. All the links to anything I have discussed in this episode is in the descriptions of this podcast.
Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.</itunes:summary>
                <description><![CDATA[<p><strong>Hello and welcome to Simplified Security Episode Number 2.</strong></p>
<p>Links:</p>
<p><br></p>
<p><strong>Vulnerability in Google Play Core Library:</strong></p>
<p>https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ </p>
<p><strong>TrickBot Malware gets a creepy feature:</strong></p>
<p>https://www.advanced-intel.com/post/persist-brick-profit-trickbot-offers-new-trickboot-uefi-focused-functionality </p>
<p><strong>CVE-2020-8539.</strong></p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2020-8539</p>
<p><em>Kia Motors Head Unit CVE:</em></p>
<p><strong>Italian National Research Council Research Paper:</strong></p>
<p>https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf </p>
<p><strong>What When and Why In Security:</strong></p>
<p>Windows 98 End of Life</p>
<p>https://www.informationweek.com/windows-98-presents-security-problems-as-it-ends-lifespan/d/d-id/1022187?piddl_msgorder=asc </p>
<p>Please provide me your feedback by reaching out on my twitter @durgeshkalya. All the links to anything I have discussed in this episode is in the descriptions of this podcast.</p>
<p>Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Hello and welcome to Simplified Security Episode Number 2.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Links:&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability in Google Play Core Library:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;TrickBot Malware gets a creepy feature:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;https://www.advanced-intel.com/post/persist-brick-profit-trickbot-offers-new-trickboot-uefi-focused-functionality &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;CVE-2020-8539.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;https://nvd.nist.gov/vuln/detail/CVE-2020-8539&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Kia Motors Head Unit CVE:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Italian National Research Council Research Paper:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What When and Why In Security:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Windows 98 End of Life&lt;/p&gt;
&lt;p&gt;https://www.informationweek.com/windows-98-presents-security-problems-as-it-ends-lifespan/d/d-id/1022187?piddl_msgorder=asc &lt;/p&gt;
&lt;p&gt;Please provide me your feedback by reaching out on my twitter @durgeshkalya. All the links to anything I have discussed in this episode is in the descriptions of this podcast.&lt;/p&gt;
&lt;p&gt;Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.&lt;/p&gt;</content:encoded>
                
                <enclosure length="12595617" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/3d352456-8c30-400e-9753-a1dad2dfe495/stream.mp3"/>
                
                <guid isPermaLink="false">a64517da-e6b9-4b6f-8f82-1416a81b0536</guid>
                <link>https://securitybits.sounder.fm</link>
                <pubDate>Thu, 10 Dec 2020 14:10:12 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/5/8/05edfdaa-ae2e-4d25-b1e5-4c8d0eec7267_page-4-square_big.jpg"/>
                <itunes:duration>787</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Simplified Security -Wordpress Plugins, Fortinet FortiOS System File Leak, Interpol and more!</itunes:title>
                <title>Simplified Security -Wordpress Plugins, Fortinet FortiOS System File Leak, Interpol and more!</title>

                <itunes:episode>1</itunes:episode>
                
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:summary>Welcome to the ICSBits.com&#39;s Simplified Security Episode 1:
Wordpress Plugins, Fortinet Forti System File Leak, Interpol and more!                                                  Video Podcast: https://youtu.be/zNsWFASXYoE

Text Blog: https://icsbits.com/2020/12/01/simplified-security-e1/.
Digitally Signed Malware which goes by the name Bandook Story:
https://research.checkpoint.com/2020/bandook-signed-delivered/
Wordpress Story:
https://www.webarxsecurity.com/wordpress-vulnerability-news-september-2020/
Fake News and Disinformation:
https://www.nytimes.com/2020/10/14/technology/personaltech/how-to-deal-with-a-crisis-of-misinformation.html
Interpols News:
https://www.interpol.int/en/News-and-Events/News/2020/Three-arrested-as-INTERPOL-Group-IB-and-the-Nigeria-Police-Force-disrupt-prolific-cybercrime-group
Fortinet FortiOS System File Leak:
https://www.fortiguard.com/psirt/FG-IR-18-384
https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379
Drupal Releases Security Updates for Tar and other vulnerabilities:
https://www.drupal.org/sa-core-2020-013
VMware Releases Workarounds for their command injection vulnerability:
https://www.vmware.com/security/advisories/VMSA-2020-0027.html#
These episodes are available in Text, video and audio formats. Check out icsbits.com/simplified for more details.
In every episode we will look at some of the security highlights especially the ones that made it to the news and also find out about any new security events that are happening around the world this week in our NEWS In Security segment.
Then we will cover vulnerabilities that scored a CVE score of 10 &amp; discuss any countermeasures that may be available in our Patch or Latch segment.
And finally, we will go into the past and learn about some interesting security topics and discover how it has transformed or influenced our present in our What When &amp; Why in Security segment.
Make sure you subscribe to simplified security episodes available as podcast and on Youtube. Go to icsbits.com/simplified for more details.
I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or Youtube, until then be safe and think before you click.</itunes:summary>
                <description><![CDATA[<p>Wordpress Plugins, Fortinet Forti System File Leak, Interpol and more!                                                  Video Podcast: https://youtu.be/zNsWFASXYoE<br><br>Text Blog: https://icsbits.com/2020/12/01/simplified-security-e1/.<br>Digitally Signed Malware which goes by the name Bandook Story:<br>https://research.checkpoint.com/2020/bandook-signed-delivered/</p>
<p><br>Wordpress Story:<br>https://www.webarxsecurity.com/wordpress-vulnerability-news-september-2020/<br>Fake News and Disinformation:</p>
<p><br>https://www.nytimes.com/2020/10/14/technology/personaltech/how-to-deal-with-a-crisis-of-misinformation.html<br>Interpols News:<br>https://www.interpol.int/en/News-and-Events/News/2020/Three-arrested-as-INTERPOL-Group-IB-and-the-Nigeria-Police-Force-disrupt-prolific-cybercrime-group<br>Fortinet FortiOS System File Leak:<br>https://www.fortiguard.com/psirt/FG-IR-18-384<br>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html<br>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379<br>Drupal Releases Security Updates for Tar and other vulnerabilities:<br>https://www.drupal.org/sa-core-2020-013<br>VMware Releases Workarounds for their command injection vulnerability:<br>https://www.vmware.com/security/advisories/VMSA-2020-0027.html#<br>These episodes are available in Text, video and audio formats. Check out icsbits.com/simplified for more details.<br>In every episode we will look at some of the security highlights especially the ones that made it to the news and also find out about any new security events that are happening around the world this week in our NEWS In Security segment.<br>Then we will cover vulnerabilities that scored a CVE score of 10 &amp; discuss any countermeasures that may be available in our Patch or Latch segment.<br>And finally, we will go into the past and learn about some interesting security topics and discover how it has transformed or influenced our present in our What When &amp; Why in Security segment.</p>
<p><br>Make sure you subscribe to simplified security episodes available as podcast and on Youtube. Go to icsbits.com/simplified for more details.</p>
<p></p>]]></description>
                <content:encoded>&lt;p&gt;Wordpress Plugins, Fortinet Forti System File Leak, Interpol and more!                                                  Video Podcast: https://youtu.be/zNsWFASXYoE&lt;br&gt;&lt;br&gt;Text Blog: https://icsbits.com/2020/12/01/simplified-security-e1/.&lt;br&gt;Digitally Signed Malware which goes by the name Bandook Story:&lt;br&gt;https://research.checkpoint.com/2020/bandook-signed-delivered/&lt;/p&gt;
&lt;p&gt;&lt;br&gt;Wordpress Story:&lt;br&gt;https://www.webarxsecurity.com/wordpress-vulnerability-news-september-2020/&lt;br&gt;Fake News and Disinformation:&lt;/p&gt;
&lt;p&gt;&lt;br&gt;https://www.nytimes.com/2020/10/14/technology/personaltech/how-to-deal-with-a-crisis-of-misinformation.html&lt;br&gt;Interpols News:&lt;br&gt;https://www.interpol.int/en/News-and-Events/News/2020/Three-arrested-as-INTERPOL-Group-IB-and-the-Nigeria-Police-Force-disrupt-prolific-cybercrime-group&lt;br&gt;Fortinet FortiOS System File Leak:&lt;br&gt;https://www.fortiguard.com/psirt/FG-IR-18-384&lt;br&gt;https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html&lt;br&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379&lt;br&gt;Drupal Releases Security Updates for Tar and other vulnerabilities:&lt;br&gt;https://www.drupal.org/sa-core-2020-013&lt;br&gt;VMware Releases Workarounds for their command injection vulnerability:&lt;br&gt;https://www.vmware.com/security/advisories/VMSA-2020-0027.html#&lt;br&gt;These episodes are available in Text, video and audio formats. Check out icsbits.com/simplified for more details.&lt;br&gt;In every episode we will look at some of the security highlights especially the ones that made it to the news and also find out about any new security events that are happening around the world this week in our NEWS In Security segment.&lt;br&gt;Then we will cover vulnerabilities that scored a CVE score of 10 &amp;amp; discuss any countermeasures that may be available in our Patch or Latch segment.&lt;br&gt;And finally, we will go into the past and learn about some interesting security topics and discover how it has transformed or influenced our present in our What When &amp;amp; Why in Security segment.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;Make sure you subscribe to simplified security episodes available as podcast and on Youtube. Go to icsbits.com/simplified for more details.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="12193123" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/3d24e4e0-b41c-40b4-bd4f-7e2ecf0490a7/stream.mp3"/>
                
                <guid isPermaLink="false">ce5e1910-5a0f-499b-88ba-0116c0b69f66</guid>
                <link>https://securitybits.sounder.fm/episode/simplified-security-e1-wordpress-plugins-forti</link>
                <pubDate>Wed, 02 Dec 2020 02:13:19 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/5/8/2cf2f35f-49cf-40e6-a03c-bbfeff429ce9_page-3-square_big.jpg"/>
                <itunes:duration>762</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>trailer</itunes:episodeType>
                <itunes:title>Simplified Security - Trailer</itunes:title>
                <title>Simplified Security - Trailer</title>

                
                
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:summary>Welcome to the ICSBits.com&#39;s Simplified Security Episodes. These episodes are available in Text, video and audio formats. Check out icsbits.com/simplified for more details. &amp;nbsp;

 In every episode we will look at some of the security highlights especially the ones that made it to the news and also find out about any new security events that are happening around the world this week in our NEWS In Security segment. &amp;nbsp;

 Then we will cover vulnerabilities that scored a CVE score of 10 &amp;amp; discuss any countermeasures that may be available in our Patch or Latch segment. &amp;nbsp;

 And finally, we will go into the past and learn about some interesting security topics and discover how it has transformed or influenced our present in our What When &amp;amp; Why in Security segment. &amp;nbsp;

Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to icsbits.com/simplified for more details. &amp;nbsp;I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.</itunes:summary>
                <description><![CDATA[<p>Welcome to the ICSBits.com&#39;s Simplified Security Episodes. These episodes are available in Text, video and audio formats. Check out icsbits.com/simplified for more details.   </p><ul><li>In every episode we will look at some of the security highlights especially the ones that made it to the news and also find out about any new security events that are happening around the world this week in our <strong>NEWS In Security segment.</strong></li><li> </li><li>Then we will cover vulnerabilities that scored a CVE score of 10 &amp; discuss any countermeasures that may be available in our <strong>Patch or Latch segment. </strong></li><li> </li><li>And finally, we will go into the past and learn about some interesting security topics and discover how it has transformed or influenced our present in our <strong>What When &amp; Why in Security segment. </strong></li></ul><p>Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to <a href="http://icsbits.com/simplified" rel="nofollow">icsbits.com/simplified</a> for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.</p>]]></description>
                <content:encoded>&lt;p&gt;Welcome to the ICSBits.com&amp;#39;s Simplified Security Episodes. These episodes are available in Text, video and audio formats. Check out icsbits.com/simplified for more details.   &lt;/p&gt;&lt;ul&gt;&lt;li&gt;In every episode we will look at some of the security highlights especially the ones that made it to the news and also find out about any new security events that are happening around the world this week in our &lt;strong&gt;NEWS In Security segment.&lt;/strong&gt;&lt;/li&gt;&lt;li&gt; &lt;/li&gt;&lt;li&gt;Then we will cover vulnerabilities that scored a CVE score of 10 &amp;amp; discuss any countermeasures that may be available in our &lt;strong&gt;Patch or Latch segment. &lt;/strong&gt;&lt;/li&gt;&lt;li&gt; &lt;/li&gt;&lt;li&gt;And finally, we will go into the past and learn about some interesting security topics and discover how it has transformed or influenced our present in our &lt;strong&gt;What When &amp;amp; Why in Security segment. &lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Make sure you subscribe to simplified security episodes available as podcast and on YouTube. Go to &lt;a href=&#34;http://icsbits.com/simplified&#34; rel=&#34;nofollow&#34;&gt;icsbits.com/simplified&lt;/a&gt; for more details. I am your host Durgesh Kalya. Catch me on my next episode on your favorite podcast app or YouTube, until then be safe and think before you click.&lt;/p&gt;</content:encoded>
                
                <enclosure length="2298775" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/9909a2df-9409-4390-93db-a053bfd83596/stream.mp3"/>
                
                <guid isPermaLink="false">5d7b295a-8926-4f9b-b98b-67d43b622310</guid>
                <link>https://securitybits.sounder.fm</link>
                <pubDate>Fri, 27 Nov 2020 05:48:57 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/7/8/72156f95-32ed-478f-9a93-bb717bd4645a_c3b455cf-700b-4065-b19a-abfd98410e2c_page-2-square_big.jpg"/>
                <itunes:duration>143</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
    </channel>
</rss>
