
Sign up to save your podcasts
Or
In this episode of The Jerich Show, join your favorite cybersecurity duo, Erich Kron and Javvad Malik, as they dive into some truly wild cybercrime stories making headlines around the globe. Hackers who've been terrorizing UK retailers have hopped the pond to target US companies, while Japan's bold plan to double its cybersecurity workforce might mean saying sayonara to tough certifications. Meanwhile, the EU arms defenders with a shiny new vulnerability database, and the discovery of rogue communication devices lurking in Chinese-made solar inverters sparks fresh paranoia. Plus, could your CPU itself soon be held hostage by ransomware? Tune in for laughs, insights, and a healthy dose of cyber skepticism!
Stories from the show:
Hackers behind UK retail attacks now targeting US companies
Japan aims to double cybersecurity specialists by 2030, relax certification requirements
EU launches vulnerability database to tackle cybersecurity threats
CPU microcode hack could infect processors with ransomware directly
‘Rogue’ communication devices found on Chinese-made solar power inverters
5
44 ratings
In this episode of The Jerich Show, join your favorite cybersecurity duo, Erich Kron and Javvad Malik, as they dive into some truly wild cybercrime stories making headlines around the globe. Hackers who've been terrorizing UK retailers have hopped the pond to target US companies, while Japan's bold plan to double its cybersecurity workforce might mean saying sayonara to tough certifications. Meanwhile, the EU arms defenders with a shiny new vulnerability database, and the discovery of rogue communication devices lurking in Chinese-made solar inverters sparks fresh paranoia. Plus, could your CPU itself soon be held hostage by ransomware? Tune in for laughs, insights, and a healthy dose of cyber skepticism!
Stories from the show:
Hackers behind UK retail attacks now targeting US companies
Japan aims to double cybersecurity specialists by 2030, relax certification requirements
EU launches vulnerability database to tackle cybersecurity threats
CPU microcode hack could infect processors with ransomware directly
‘Rogue’ communication devices found on Chinese-made solar power inverters