Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CISSP Study Group.com

Breaches, Vulnerabilities, and CISSP Defenses

27 Jun 2025

Description

An in-depth analysis of modern hacking methodsand their implications for CISSP security domains. It examines various high-profile cyber incidents, categorizing them by attack vectors such as supply chain compromises (e.g., SolarWinds, Kaseya), zero-day exploits (e.g., Exchange ProxyLogon, Log4j), managed file transfer breaches (e.g., MOVEit), and ransomware attacks on critical infrastructure (e.g., Colonial Pipeline). The document also highlights the enduring threat of social engineering and credential theft. For each incident, it breaks down attacker tactics, techniques, and procedures (TTPs), linking them directly to relevant CISSP principles and mitigation strategies, emphasizing the importance of defense in depth and robust incident response.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.