
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10
2025-12-16 | 42 min.
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The conversation emphasizes the importance of security research, the evolving landscape of cybersecurity threats, and the need for organizations to prioritize basic security practices.----------------------------------------------------YouTube Video Link: https://youtu.be/dgAjUunyiKE----------------------------------------------------Documentation:https://www.theregister.com/2025/12/12/microsoft_more_bug_payouts/https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/https://www.darkreading.com/cyber-risk/us-makes-cyber-strategy-changeshttps://owasp.org/Top10/2025/0x00_2025-Introduction/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: [email protected]----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: [email protected]

Salt Typhoon - The Growing China Threat
2025-12-09 | 42 min.
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponsored group, Salt Typhoon. They discuss the group's tactics, motivations, and the implications for global security. The conversation highlights China's strategic focus on economic power as a means of national security, their long-term approach to cyber warfare, and the emerging role of AI in both coding and cybersecurity. The hosts emphasize the importance of understanding these dynamics to better defend against potential threats.----------------------------------------------------YouTube Video Link: https://youtu.be/QCwhcTjVZuY----------------------------------------------------Documentation:https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-votehttps://www.thetimes.com/uk/defence/article/china-stolen-personal-data-britain-8lw0bpmmchttps://www.techradar.com/pro/security/notorious-chinese-hacking-group-salt-typhoon-found-lurking-in-european-comms-networkshttps://www.crowdstrike.com/en-us/blog/crowdstrike-researchers-identify-hidden-vulnerabilities-ai-coded-software/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: [email protected]----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: [email protected]

Chat app vulnerabilities, Use AI or else
2025-12-02 | 42 min.
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing on Line and WhatsApp. They explore the implications of these vulnerabilities for user privacy and security, emphasizing the importance of API security and rate limiting. The conversation then shifts to the integration of AI in the workplace, highlighting how companies are adapting to this technology and the challenges employees face in learning to use it effectively. Finally, they touch on the impact of AI on education and the need for responsible use of technology.----------------------------------------------------YouTube Video Link: https://youtu.be/zK3JKEcisfY----------------------------------------------------Documentation:https://www.darkreading.com/application-security/line-messaging-bugs-asian-cyber-espionagehttps://www.bleepingcomputer.com/news/security/whatsapp-api-flaw-let-researchers-scrape-35-billion-accounts/https://www.wsj.com/tech/ai/ai-work-use-performance-reviews-1e8975df?mod=e2li----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: [email protected]----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: [email protected]

2025 Microsoft Ignite Recap for Security
2025-11-25 | 59 min.
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introduction of Security Copilot for Microsoft 365 E5 customers, innovations in identity management through Entra, and the integration of Defender for Cloud with GitHub. They also explore the new capabilities in Intune for remote management of Windows devices, highlighting the significant advancements in cybersecurity technology and its implications for organizations. In this episode, the hosts discuss significant advancements in device management, particularly focusing on Intune's future and its capabilities. They explore enhancements in Microsoft Sentinel, the introduction of the Security Store for security solutions, and the integration of AI in data security through Purview. Additionally, they highlight various security enhancements in Windows, emphasizing the importance of adapting to modern cybersecurity challenges.----------------------------------------------------YouTube Video Link: https://youtu.be/GdHZWGm7e0o----------------------------------------------------Documentation:https://news.microsoft.com/ignite-2025-book-of-news/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: [email protected]----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: [email protected]

Unencrypted Satellite Data, China AI Cyberattack
2025-11-18 | 36 min.
SummaryIn this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly the vulnerabilities of unencrypted communications. They explore a recent study revealing how researchers intercepted sensitive data from various satellite communications, highlighting the need for encryption. The conversation shifts to the implications of AI in cybersecurity, detailing a sophisticated cyber attack executed with minimal human intervention. The hosts emphasize the importance of adapting cybersecurity strategies to counteract evolving threats, particularly those leveraging AI technologies.----------------------------------------------------YouTube Video Link: https://youtu.be/URiBKZLlO2g----------------------------------------------------Documentation:https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/https://www.anthropic.com/news/disrupting-AI-espionage----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: [email protected]----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: [email protected]



Blue Security