{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Talkin' Bout [Infosec] News","title":"Talkin' About Infosec News - 2/1/2021","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/54c4e708\"></iframe>","width":"100%","height":180,"duration":3738,"description":"Originally Aired on February 1, 2021\n\n\n\nArticles discussed in this episode:\n\n\n\n* https://threatpost.com/microsoft-365-bec-innovation/163508/* https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/* https://www.newyorker.com/magazine/2021/02/08/the-next-cyberattack-is-already-under-way?&web_view=true\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nCheck out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    \n\n\n\nhttps://www.blackhillsinfosec.com/services/cyber-range/ \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nJoin the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.\n\n\n\n            \n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tJoin 3,008 other subscribers\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t                    \n                        \n\t\t\t\t\t\t\tEmail Address                        \n                        \n                    \n\n                    \n                        \n                        \n                        \n                        \n\t\t\t\t\t\t                        \n\t                        Subscribe","thumbnail_url":"https://img.transistorcdn.com/WPYM9pq_SRUcywHv9tdgpsGLyLx04W2rDmzktvAcD4Y/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTA1/ZWZhNDcxZGM4ZTFj/ZGJhMTMwNmYzMmJj/ZjBkNi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}