Check out our companion blog!

Videos

March 11, 2026

Google & Apple Dominates Password Manager Market! #shorts

Google & Apple Dominates Password Manager Market! #shorts

Google and Apple's built-in tools control 55% of the password manager market. Ransomware recovery is a choice, not a given. #PasswordManagers #Cybersecurity #TechNews #Google #Apple

View more
March 11, 2026

Server Impersonation: Recovering Your Vault Explained #shorts

Server Impersonation: Recovering Your Vault Explained #shorts

Impersonating a server to reset your vault password? This attack vector hinges on trust. They can use your recovery key to access your vault without your explicit consent. A stark reminder: ransomware recovery isn't always straightforward. #Ransomware #Cybersecurity #DataRecovery #VaultSecurity #TechExplained

View more
March 11, 2026

Most people are not using a password manager #shorts

Most people are not using a password manager #shorts

Did you know 250 million people worldwide rely on password managers? A recent study analyzed Bitwarden, LastPass, and Dashlane, revealing their massive user base and market share. It highlights a significant adoption of these security tools. #PasswordManagers #Cybersecurity #Tech #DigitalSecurity #DataProtection

View more
March 10, 2026

Password Manager Hacked? Critical Security Vulnerabilities Exposed! #shorts

Password Manager Hacked? Critical Security Vulnerabilities Exposed! #shorts

Researchers found edge-case vulnerabilities in password managers, including impersonating servers during password recovery and issues with encrypted vault field manipulation. Stronger verification could prevent exposure. #PasswordSecurity #CyberSecurity #TechVulnerabilities #DataProtection

View more
March 10, 2026

Password Manager Security: How Encryption Keeps Your Data Safe #shorts

Password Manager Security: How Encryption Keeps Your Data Safe #shorts

Your passwords are encrypted locally with a master password. This ensures even the password manager vendor can't access your unencrypted data. You control access, always. #PasswordSecurity #Cybersecurity #DataProtection #TechTips

View more
March 10, 2026

Passkeys & MFA: The Future of Online Security Explained! #shorts

Passkeys & MFA: The Future of Online Security Explained! #shorts

Protect your most vital accounts like banking and shopping with passkeys. It's a crucial step beyond password managers to prevent a world of hurt, including ransomware. #Passkeys #Cybersecurity #OnlineSafety #TechTips #Security

View more
March 10, 2026

Passkeys vs. Password Managers: Which is Better for Security? #shorts

Passkeys vs. Password Managers: Which is Better for Security? #shorts

Passkeys are the future, offering enhanced security by tying authentication to your device. But does this mean password managers are obsolete? Let's explore the evolving landscape of digital security. #Passkeys #PasswordManagers #Cybersecurity #TechTrends #DigitalSecurity

View more
March 10, 2026

Password Managers: Still Safe? My Honest Opinion #shorts

Password Managers: Still Safe? My Honest Opinion #shorts

Even with password managers, a few high-profile breaches occurred due to hardcoded passwords and older encryption. Despite this, they remain essential for security. Learn why. #PasswordManager #Cybersecurity #DataBreach #TechSecurity #OnlineSafety

View more
March 10, 2026

Password Managers: Vulnerabilities Revealed & Passkeys Explained #shorts

Password Managers: Vulnerabilities Revealed & Passkeys Explained #shorts

Password managers aren't always bulletproof. A recent analysis of LastPass, Bitwarden, and Dashlane revealed vulnerabilities, highlighting the constant need for testing and validation to protect your credentials, especially for critical assets like crypto wallets. #PasswordManager #CyberSecurity #TechNews #DataProtection #Vulnerabilities

View more
March 9, 2026

Passkeys Frustrating: The REAL Login Problems Exposed! #shorts

Passkeys Frustrating: The REAL Login Problems Exposed! #shorts

Trying to log into QuickBooks with a passkey becomes a nightmare. You authenticate, but then it still asks for MFA. That defeats the whole purpose! #Passkeys #QuickBooks #TechFrustration #MFA #Cybersecurity

View more
March 9, 2026

Password Vault Vulnerabilities: The Hidden Trust Trap #shorts

Password Vault Vulnerabilities: The Hidden Trust Trap #shorts

The core concept of knowledge encryption, designed for secure password sharing, has inherent vulnerabilities. Trusting a vendor for recovery creates a significant risk. #Encryption #Cybersecurity #PasswordManagement #DataSecurity #TechVulnerabilities

View more
March 9, 2026

Password Security vs. Convenience: The Sticky Note Nightmare! #shorts

Password Security vs. Convenience: The Sticky Note Nightmare! #shorts

Is your security so tight no one can use it? The constant battle between robust protection and user-friendliness. See why sticky notes are NOT the answer. #CyberSecurity #PasswordTips #Tech #BusinessSecurity

View more
March 9, 2026

Former Employee's Backdoor: A Cybersecurity Nightmare! #shorts

Former Employee's Backdoor: A Cybersecurity Nightmare! #shorts

A former consultant left a backdoor open into a financial trading firm's systems, logging in to fix firewall errors. This highlights major differences between consumer and enterprise password management. #Cybersecurity #DataBreach #PasswordManagement #CompanySecurity

View more
March 9, 2026

New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden & Dashlane

New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden & Dashlane

Password manager vulnerabilities aren't just about bad code — and a new research paper out of Zurich just proved it. Researchers analyzed three of the most popular password managers and found fundamental design flaws baked into the very architecture that's supposed to keep your credentials safe. Curtis and Prasanna break…

View more
March 9, 2026

Password Vault Locked? RECOVERY PLAN ESSENTIAL! #shorts

Password Vault Locked? RECOVERY PLAN ESSENTIAL! #shorts

Getting locked out of your password vault can be a nightmare. The recovery process requires trusting a vendor, creating a core vulnerability. Is there a way around it? #PasswordSecurity #CyberSecurity #DataRecovery #TechVulnerability

View more
March 9, 2026

Password Manager Vulnerabilities EXPOSED — LastPass, Bitwarden & Dashlane

Password Manager Vulnerabilities EXPOSED — LastPass, Bitwarden & Dashlane

Password manager vulnerabilities just got real. New research out of Zurich found fundamental design flaws in LastPass, Bitwarden & Dashlane — not bad code, but broken architecture. Researchers analyzed three of the most popular password managers on the planet and came back with something nobody really wanted to hear: the…

View more
March 2, 2026

What Is an Initial Access Broker — and Why Should You Care?

What Is an Initial Access Broker — and Why Should You Care?

What is an initial access broker — and why does it matter to your organization? In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Dr. Mike Saylor of Black Swan Cybersecurity to break down the role of the initial access broker in today's ransomware attacks. Most people…

View more
March 2, 2026

What Is an Initial Access Broker? The Hidden First Step in Ransomware Attacks

What Is an Initial Access Broker? The Hidden First Step in Ransomware Attacks

What is an initial access broker? If you don't know, you need to — because understanding the initial access broker is the first step to understanding how most ransomware attacks actually begin. W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi are joined by Dr. Mike Saylor of Black Swan Cybersecurity…

View more
Feb. 26, 2026

The Extravagant Hacker: Not Your Typical Tech Genius! #shorts

The Extravagant Hacker: Not Your Typical Tech Genius! #shorts

Most hackers are introverted and socially awkward, but some, like the legendary 'Soup Nazi,' were extravagant show-offs flaunting wealth and cars. A rare exception in the cyber underworld. #HackerCulture #Cybersecurity #TechHistory #RareException

View more
Feb. 26, 2026

Your Computer Is a Zombie! What is a Botnet? #shorts

Your Computer Is a Zombie! What is a Botnet? #shorts

Your computer might be part of a botnet without you knowing! Discover how compromised endpoints are managed and rented out for attacks, with millions of devices available for hire. #Botnet #Cybersecurity #ComputerSecurity #TechExplained #Malware

View more
Feb. 26, 2026

Cyber Criminals: No Empathy, Just Code #shorts

Cyber Criminals: No Empathy, Just Code #shorts

They aren't respected or empathetic. These keyboard warriors hide behind screens, detached from the real harm they inflict. Ransomware attackers don't see victims; they see targets. #Cybercrime #OnlineTrolls #Ransomware #DigitalSecurity

View more
Feb. 25, 2026

Cybercriminals Rent Dark Web Infrastructure: Botnets Explained! #shorts

Cybercriminals Rent Dark Web Infrastructure: Botnets Explained! #shorts

Cybercriminals don't build; they rent. Discover how ransomware gangs lease infrastructure from botnets, creating and discarding their malicious environments on demand. The hardware is the battlefield. #Ransomware #Cybersecurity #Botnet #Malware #Tech

View more
Feb. 25, 2026

Why Ransomware Gangs Don't Attack Themselves! #shorts

Why Ransomware Gangs Don't Attack Themselves! #shorts

Why would a threat actor take $30,000 upfront for a ransomware attack? Because they're paid before the attack even happens. It's a cookie-cutter service that guarantees upfront payment, unlike attacking alone. #Ransomware #Cybersecurity #ThreatActor #Hacking

View more
Feb. 25, 2026

Ransomware-as-a-Service: Unpacking Cybercrime's Risky Business Model #shorts

Ransomware-as-a-Service: Unpacking Cybercrime's Risky Business Model #shorts

Why do ransomware operators offer their services for a cut? They take on significant risk, essentially buying a lottery ticket by enabling attacks. It's like running a profitable company but still hoping for that big win. #Ransomware #Cybersecurity #RaaS #Malware #TechExplained

View more