On this episode of Leaky Weekly, host and security researcher Nick Ascoli and Flare’s Identity Security Expert Mike Iaconianni dig into their responses and questions to the Microsoft 2025 Digital Defense Report.
🔗Here are the resources they mention:
• Microsoft Digital Defense Report 2025 https://www.microsoft.com/en-us/corpo...
• • Screenshot.jpg (When They Got Hacked)
🔍 Brought to you by Flare, Threat Exposure Management solution and industry-leading dataset on cybercrime that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization:
https://try.flare.io/free-trial/?utm_...
🧠 Check out Flare Academy: https://flare.io/flare-academy/?utm_s...
Our free training series led by experts on critical topics such as threat intelligence, operational security, and advanced investigation techniques (earn CPE credits towards cybersecurity certifications)
Our Discord community is a space to learn from and with cybersecurity professionals (including Nick!) and students, check out previous training resources, and keep up with upcoming training
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(20) {
["W26qrWCOqO0"]=>
object(stdClass)#5985 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "W26qrWCOqO0"
["related_video_title"]=>
string(73) "Beyond Compliance Future Proofing Landfill Operations for Emerging Issues"
["posted_time"]=>
string(21) "7 дней назад"
["channelName"]=>
NULL
}
["hBDMjbzLfWs"]=>
object(stdClass)#6000 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "hBDMjbzLfWs"
["related_video_title"]=>
string(85) "Разговор с тем, кто поддерживает Путина / вДудь"
["posted_time"]=>
string(24) "18 часов назад"
["channelName"]=>
NULL
}
["dc6q04o8Y6o"]=>
object(stdClass)#5986 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "dc6q04o8Y6o"
["related_video_title"]=>
string(77) "Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED"
["posted_time"]=>
string(27) "5 месяцев назад"
["channelName"]=>
NULL
}
["OaUWoD8ZbN8"]=>
object(stdClass)#5983 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "OaUWoD8ZbN8"
["related_video_title"]=>
string(62) "Open Q&A | September 23, 2025 | MSFT EDU Endpoint Office Hours"
["posted_time"]=>
string(22) "13 дней назад"
["channelName"]=>
NULL
}
["iGE7b_XQqtY"]=>
object(stdClass)#5978 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "iGE7b_XQqtY"
["related_video_title"]=>
string(65) "2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
NULL
}
["uTcrbNBcoxQ"]=>
object(stdClass)#5994 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "uTcrbNBcoxQ"
["related_video_title"]=>
string(42) "Windows Privilege Escalation for Beginners"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["L0KbiHNtfTs"]=>
object(stdClass)#5975 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "L0KbiHNtfTs"
["related_video_title"]=>
string(81) "Вас взломали? Расширенный метод обнаружения"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["AFLxUqDXoy0"]=>
object(stdClass)#5995 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AFLxUqDXoy0"
["related_video_title"]=>
string(25) "Apprenticeship & Veterans"
["posted_time"]=>
string(21) "9 дней назад"
["channelName"]=>
NULL
}
["z5nc9MDbvkw"]=>
object(stdClass)#5980 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "z5nc9MDbvkw"
["related_video_title"]=>
string(164) "Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli..."
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
NULL
}
["Ieegg45Pojw"]=>
object(stdClass)#5998 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Ieegg45Pojw"
["related_video_title"]=>
string(92) "Cybersecurity For Beginners | Basics of Cyber security For Beginners Complete Course, Google"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["vKPGZHoHX8k"]=>
object(stdClass)#5974 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "vKPGZHoHX8k"
["related_video_title"]=>
string(55) "How Hackers Steal Passwords: 5 Attack Methods Explained"
["posted_time"]=>
string(27) "6 месяцев назад"
["channelName"]=>
NULL
}
["s19BxFpoSd0"]=>
object(stdClass)#5984 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "s19BxFpoSd0"
["related_video_title"]=>
string(86) "Cybersecurity Mastery: Complete Course in a Single Video | Cybersecurity For Beginners"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["3-MSlNVqzYY"]=>
object(stdClass)#5979 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "3-MSlNVqzYY"
["related_video_title"]=>
string(45) "The Most Destructive Hack Ever Used: NotPetya"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
NULL
}
["ZxF4GRbdgCc"]=>
object(stdClass)#5976 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ZxF4GRbdgCc"
["related_video_title"]=>
string(87) "Почему люди покупают НЕ те ноутбуки для хакинга"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["LKR8cdfKeGw"]=>
object(stdClass)#5977 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "LKR8cdfKeGw"
["related_video_title"]=>
string(84) "Анализ вредоносных программ и угроз: обходы UAC"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["oV07c-1EDHs"]=>
object(stdClass)#5965 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "oV07c-1EDHs"
["related_video_title"]=>
string(42) "Intro To OPSEC For Home Users | 2026 Guide"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["7xZIZnMUbZU"]=>
object(stdClass)#5966 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7xZIZnMUbZU"
["related_video_title"]=>
string(160) "АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
["rIBJedYtz68"]=>
object(stdClass)#5972 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "rIBJedYtz68"
["related_video_title"]=>
string(62) "Real World OSINT and Cyber Threat Intelligence Tips and Tricks"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["clESYc9BDvc"]=>
object(stdClass)#5973 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "clESYc9BDvc"
["related_video_title"]=>
string(172) "Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ..."
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
NULL
}
["72PEVups0-c"]=>
object(stdClass)#5971 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "72PEVups0-c"
["related_video_title"]=>
string(183) "Поиск вредоносных программ для кражи информации в даркнете (поиск вредоносных программ для кражи ..."
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
}