Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
We do reviews of movies, series, shows and animation shows and film from streaming entertainment giant Netflix. Tune in to find out what's what, like what to watch and what not to watch! SPOILER ALERT!
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
Discussing all things tech and simplifying concepts for those new to tech.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Compelling conversations with Tech Industry leaders.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
…
continue reading
Every week, Jim invites different friends to guest on Topic Lords and be excited about whatever they've been fixated on this week.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
The podcast by the Linux Mint community for all users of Linux.
…
continue reading
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
…
continue reading
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Windows outage, Fin7 sells malware, Synnovis blood shortage
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Windows outage worldwide UK national blood stocks suffer the effects of ransomware Security flaws in SAP AI Core cloud-based platform Thanks to today's episode sponsor, Conveyor It’s Friday and Conveyor hopes you don’t have a meaty security questionnaire waiting for you on the other side of this podcast. If you do, you should check them out. As the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Firefox data collection hot water, Windows 11 gets worse and Polyfill CDN malwares all the things!
1:06:48
1:06:48
Play later
Play later
Lists
Like
Liked
1:06:48
Firefox gets into hot water with its latest 'prototype' that collects data without consent. Windows 11 gets more ads and helpfully uploads your data to OneDrive and Polyfill. What is there to say about that? So much, it turns out. Join Chocolatey Software's James Ruskin, Josh King and Paul Broadwith as we go through the latest tech and security new…
…
continue reading
This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, …
…
continue reading
Links: https://www.darkreading.com/cybersecurity-operations/a-cisos-guide-to-avoiding-jail-after-a-breach https://www.csoonline.com/article/2512955/us-supreme-court-ruling-will-likely-cause-cyber-regulation-chaos.html/ https://sansec.io/research/polyfill-supply-chain-attack https://www.securityweek.com/over-380k-hosts-still-referencing-malicious-po…
…
continue reading
In this episode of the Breaking Badness Cybersecurity Podcast, Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss vulnerabilities impacting your phone's 5G connection along with the new owner of the popular Polyfill JS project injecting malware into more than 100,000 sites.By DomainTools
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
376: Hackers Use New Malware Powered By Emojis
1:18:34
1:18:34
Play later
Play later
Lists
Like
Liked
1:18:34
https://youtu.be/DfKjfgdHW9A Download as MP3 Sponsored by Kolide: If a device isn't secure, it can't access your apps. It's device trust for Okta. Visit destinationlinux.net/kolide to learn more and watch a demo. Support the show by becoming a patron at tuxdigital.com/membership or get some swag at tuxdigital.com/store Comments on our Forum ►► http…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
248. The Ephemeral Nature Of Digital Fish Food
1:03:27
1:03:27
Play later
Play later
Lists
Like
Liked
1:03:27
Lords: Elena Nathalie https://alienmelon.itch.io/ [cw:flashing lights] Topics: Fish-based screensavers Fire safety The Aquarium and the Glass Harmonica https://www.youtube.com/watch?v=KOx7zmO5ppw https://www.youtube.com/watch?v=2FAc3HmfoSY I Am Running Into A New Year by Lucille Clifton https://nextworldover.tumblr.com/post/738271770264600576 I wen…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike hits Cloud PCs, criminals exploit CrowdStrike fix, CISA rebuked
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47
Microsoft confirms CrowdStrike update also hit cloud Windows PCs Cybercriminals exploit CrowdStrike problem to distribute malware CISA adds some big names to its KEV catalog Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and mor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Worst Cyber Event in History: CrowdStrike Update Causes Global Chaos. Cyber Security Today Special Edition for Monday, July 22, 2024
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12
Join Jim Love on a special edition of Cybersecurity Today and Hashtag Trending as he delves into the recent CrowdStrike incident that led to a global IT meltdown. With over 8.5 million Windows devices affected by a faulty CrowdStrike Falcon update, this event is being compared to Y2K and WannaCry. Discover the widespread impacts across key industri…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Making your ICS/OT environments cyber secure, with Dragos’ Lesley Carhart
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02
In this episode of the Cyber Uncut podcast, Lesley Carhart, director of incident response for North America at Dragos, joins host Liam Garman to unpack how businesses can improve their ICS/OT cyber processes, before giving some tangible advice for business leaders on how they can build their incident response plans. The pair begin the podcast by un…
…
continue reading
This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake ti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Researcher detects what could have been one of the largest supply chain vulnerabilities to date. Cyber Security Today Weekend for July 20th
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29
Dodging the Biggest Supply Chain Attack Ever: An Insight with JFrog's Security Research Team In this weekend edition of Cyber Security Today, host Jim Love discusses with Brian Moussalli, the Security Research Team Lead at JFrog, how potentially the biggest supply chain attack was averted. They delve into the intricacies of supply chain attacks, th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: Crowdstrike Microsoft outage, AT&T breach implications, CDK pays up
31:10
31:10
Play later
Play later
Lists
Like
Liked
31:10
Link to blog post – get exact one from https://cisoseries.com This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Adam Arellano, former vp, enterprise cybersecurity, PayPal Thanks to our show sponsor, Conveyor Why do teams choose Conveyor over the competition to automate answering security questionnaires? …
…
continue reading
AT&T has lost info on roughly one-third of the US population. Relax! They’ve plugged that hole... now. We’ll look at what was lost, revisit the Ticketmaster hack, and find out if there’s a Snowflake’s chance of fixing any of it on Checklist No. 384, brought to you by Securemac. Check out our show notes: SecureMac.com/Checklist And get in touch with…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research: Threat Actors Actively Exploiting CVE-2024-24919: Underground Forums Share IP Addresses of Vulnerable Check Point Security Gateway Devices
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30
A critical vulnerability (CVE-2024-24919) with a CVSS score of 8.6 has been discovered in EOL Check Point devices, allowing remote attackers to read arbitrary files. The Hacktivist group "Ghost Clan Malaysia" has shared affected IP addresses worldwide. Upgrade to supported versions and apply necessary hotfixes immediately to protect your data and i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
UK ransomware reporting, Project Oscar, ransoms spike
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44
UK mandatory ransomware reporting gets watered-down Google introduces AI agent to look for software bugs Critical infrastructure ransomware costs spike Thanks to today's episode sponsor, Conveyor Does the anticipation of the next monster security questionnaire wrecking your day ever make you feel like a balloon floating above a cactus field? If so,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Welcome to a new age in digital deception.
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37
This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated im…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
190. The Weak Security Default in Our Stars
51:42
51:42
Play later
Play later
Lists
Like
Liked
51:42
This week we compromised domains targeting DeFi protocols along with the JFrog research team's findings regarding a leaked access token with admin access to Python repositoriesBy DomainTools
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research: Braodo Info Stealer Targeting Vietnam and Abroad
3:48
3:48
Play later
Play later
Lists
Like
Liked
3:48
Braodo Info Stealer, a Python-based malware, is targeting users in Vietnam and several other countries. This sophisticated threat spreads possibly through phishing emails, uses GitHub for hosting malicious code, and exfiltrates stolen data via Telegram channels. Learn more about this emerging threat impacting global cybersecurity. Link to the Resea…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rite Aid update, AT&T ransom laundered, Hacktivists leak Disney data
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16
Rite Aid says 'limited’ cybersecurity incident affected over 2 million people AT&T ransom laundered through mixers and gambling services Hacktivists leak Disney data to protect artist rights Thanks to today's episode sponsor, Conveyor Why do teams choose Conveyor over the competition to automate answering security questionnaires? A few reasons. One…
…
continue reading
In our Innards section: It’s all about the NAS And finally, the feedback and a couple of suggestions Full Show Notes Here 00:00:00 – Intro 00:01:14 – Innards 00:36:29 – Vibrations From The Ether 00:49:07 – Check This Out 00:52:33 – Housekeeping and Announcemnts 00:53:25 – Wrap Up 00:55:21 – Special Thanks 00:55:58 – Outro Contact Info: Joe – Tllts.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft's Bug Reporting Criticized, Disney Hacked, and Kaspersky Exits US. Cyber Security Today Special Edition from Hashtag Trending
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24
With Howard away and today's episode of Hashtag Trending being all about security stories, I took the liberty of doing a cross posting. Hope we'll have Howard back next week. In today's episode of Hashtag Trending, host Jim Love covers significant cybersecurity news. Microsoft faces criticism for mishandling a reported MSHTML browser engine vulnera…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11
Using Content Delivery Networks Safely The CDK Global Ransomware Attack The IRS and Entrust Polyfill.io fallout Microsoft's Behavior A Snowflake's Chance Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TW…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11
Using Content Delivery Networks Safely The CDK Global Ransomware Attack The IRS and Entrust Polyfill.io fallout Microsoft's Behavior A Snowflake's Chance Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TW…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
379: Tech That Slipped Through Our Fingers
1:18:12
1:18:12
Play later
Play later
Lists
Like
Liked
1:18:12
https://youtu.be/F_ybuujPtVI Download as MP3 Support the show by becoming a patron at tuxdigital.com/membership or get some swag at tuxdigital.com/store Comments on our Forum ►► https://forum.tuxdigital.com/t/379-tech-that-slipped-through-our-fingers/6339 Hosted by: Ryan (DasGeek) = dasgeek.net Jill Bryant = jilllinuxgirl.com Michael Tunnell = mich…
…
continue reading
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.By N2K Networks
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Wiz acquisition, AT&T paid hacker, Squarespace domain defaults
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54
Alphabet in talks to acquire Wiz AT&T allegedly paid hacker to delete data Details on Squarespace domain hacks Thanks to today's episode sponsor, Conveyor Does the mountain of security questionnaires in your inbox make you feel like you're in a rowboat trying to make it through a tsunami? If so, you should check out Conveyor. As the market leader i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research- TRACKING RANSOMWARE – JUNE 2024
4:44
4:44
Play later
Play later
Lists
Like
Liked
4:44
Stay informed about the latest developments in cybersecurity with CYFIRMA's Tracking Ransomware-June 2024 Report. This month's report highlights key trends, including a decrease in ransomware attacks by groups like Play and RansomHub, while Akira and Qilin increased their operations. Discover significant changes in targeted industries, with most se…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rite Aid breach, AT&T breach implications, CDK paid ransom
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
Rite Aid announces data breach following June cyberattack The personal security implications of the AT&T breach US offers support to prevent Paris Olympics cyber and disinformation attacks Thanks to today's episode sponsor, Conveyor Ever feel like completing security questionnaires has become your full-time side hustle you’re not even getting paid …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
247. Fish That Scrutinize; Fish That Rubberneck
1:15:40
1:15:40
Play later
Play later
Lists
Like
Liked
1:15:40
Lords: Alex Shannon Topics: The less you spend on food, the better it tastes The jizz of a bird https://en.wikipedia.org/wiki/Jizz_(birding) The Cosmic Call https://blog.plover.com/2024/04/15/ Line Fishing by Daniel Kahaulelio https://files.fireside.fm/file/fireside-uploads/images/3/3597ddeb-e52e-4cda-a59c-c64600489fea/rWuOwlpV.png How to order cof…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
180 - Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 2
35:32
35:32
Play later
Play later
Lists
Like
Liked
35:32
We love to hear from you! As I said in part of this two part series episode, It's easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The frequency and scale of these incid…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Andrew Cannata, CISO, Primo Water Thanks to our show sponsor, Entro Security What are you doing to secure your company’s non-human identities? Vaults and scanners are helpful, but they don’t give the context for where your secrets are, h…
…
continue reading
The ChatGPT app for Mac had a pretty big privacy and security problem, even if parent company OpenAI didn’t think so. They fixed it anyway - we’ll tell you why. Also, some bad guy may have peeked behind the DM screen at user info on Roll20. Make your saving throw! This is The Checklist, brought to you by SecureMac! Check out our show notes: SecureM…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PHP vulnerability exploit, Auto Parts breach, dark patterns report
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09
PHP vulnerability exploited, spreading malware and DDoS attacks Advance Auto Parts reveals damage from Snowflake breach FTC report reveals dark patterns used to trick consumers Thanks to today's episode sponsor, Entro Reclaim control over your Non-human identities! Entro enables security teams to manage and secure the lifecycle of non-human identit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research- PHP CGI Argument Injection (CVE-2024-4577)- Vulnerability Analysis and Exploitation
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09
Critical Alert: Organizations using PHP in CGI mode must act now! CVE-2024-4577 presents a severe risk of remote code execution. With millions of websites potentially affected globally, immediate action is crucial. Attackers can exploit CGI argument injection to execute arbitrary commands, leading to unauthorized access or server compromise. Update…
…
continue reading
In this episode of the Cyber Uncut podcast, Phil Tarrant, Major General (Ret’d) Dr Marcus Thompson, and Liam Garman analyse the genesis of the Optus and Medibank hacks before debating the return of Julian Assange to Australia. The pair begin the podcast by pulling apart recent findings on the cause of the Optus and Medibank hacks, as well as the re…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research: Kematian-Stealer- A Deep Dive into a New Information Stealer
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24
The CYFIRMA team has uncovered "Kematian-Stealer," a sophisticated info stealer targeting Windows systems, hosted on GitHub. This open-source malware is designed to stealthily extract data from a wide range of sources, including browsers, cryptocurrency wallets, messaging apps, gaming platforms, VPNs, and email clients. Kematian-Stealer employs adv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Australia targets foreign tech, banks sunset OTP, Veeam vulnerability exploited
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06
Australia targets government tech under foreign control Singapore banks replace OTP with digital tokens New group targets Veeam vulnerability Thanks to today's episode sponsor, Entro What are you doing to secure your company’s non-human identities? Vaults and scanners are helpful, but they don’t give the context for where your secrets are, how they…
…
continue reading