Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Monday through Friday, Marketplace demystifies the digital economy in less than 10 minutes. We look past the hype and ask tough questions about an industry that’s constantly changing.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
In today's episode we have a tendency to state the most recent cyberattack on JBS and check out to quantify the impact they could wear giant businesses
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
…
continue reading
a unique perspective on technology
…
continue reading
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Your Home for Linux-related fun and learning!
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Each episode, Paul Spain and guests discuss what's happening in the world of technology, gadgets and telecommunications around the world and in New Zealand.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
True crime. Real prosecutors. Expert analysis. Experienced prosecutors from San Diego, CA discuss the latest crime news, interview criminal justice leaders, and bring you their expert analysis.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Discover Daily by Perplexity is your bite-sized briefing on the latest developments in tech, science, and culture. In a few minutes, each episode curates fascinating stories and insights from Perplexity's Discover feed to enrich your day with knowledge and spark your curiosity. From AI breakthroughs to space exploration, leadership shakeups at tech giants to the societal impact of advancing technologies, Discover Daily keeps you informed on the trends and ideas shaping our future. Leveraging ...
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading

1
CYFIRMA Research- Tracking ransomware: February 2025
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30Stay ahead of evolving ransomware threats with CYFIRMA’s Monthly Ransomware Report – February 2025. Ransomware activity surged by 87.45% in February month, with Cl0p witnessing an alarming 453% rise. Manufacturing, FMCG, and Transportation sectors faced the highest spike in attacks. The U.S. remained the top target, followed by Canada, the U.K., Ge…
…
continue reading

1
Allie Bohan on how to handle the non-technical side of a ransomware attack
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this episode, Greg Otto talks with FTI Consulting’s Allie Bohan exploring the challenges organizations face in maintaining effective communication during cyberattacks. Allie and Greg uncover essential strategies for incidents, ensuring companies remain connected with stakeholders even when digital channels are compromised. We also talk on how to…
…
continue reading

1
Ransomware’s new strategy: naming and shaming victims
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Federal officials are warning consumers against a type of cyberattack that’s been on the rise. It’s called Medusa, a ransomware program that uses tactics like phishing to infect a target’s system and encrypt their data, which hackers then threaten to publicly release unless a ransom is paid. Medusa is just one example of how hackers are evolving th…
…
continue reading

1
291: Cloud Rewind: Because CTRL+Z Doesn’t Work on Ransomware - Commvault
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
…
continue reading

1
291: Cloud Rewind: Because CTRL+Z Doesn’t Work on Ransomware – Commvault
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
…
continue reading

1
The ransomware clones of HellCat & Morpheus. [Research Saturday]
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resu…
…
continue reading

1
The ransomware clones of HellCat & Morpheus.
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resu…
…
continue reading

1
SANS Stormcast Thursday Mar 13th: Exploiting Login Pages with Log4j; Patch Tuesday Fallout; Adobe Patches; Medusa Ransomware; Zoom and Font Library Updates;
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56Log4J Scans for VMWare Hyhbrid Cloud Extensions An attacker is scanning various login pages, including the authentication feature in the VMWare HCX REST API for Log4j vulnerabilities. The attack submits the exploit string as username, hoping to trigger the vulnerability as Log4j logs the username https://isc.sans.edu/diary/Scans%20for%20VMWare%20Hy…
…
continue reading

1
Risky Business #783 -- Evil webcam ransomwares entire Windows network
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news with special guest Rob Joyce, a Former Special Assistant to the US President and Director of Cybersecurity for NSA. They talk through: A realistic bluetooth-proximity phishing attack against Passkeys A very patient ransomware actor encrypts an entire enterprise …
…
continue reading

1
NZ Satellite to Mobile competition heats up, Ransomware via Webcam + more
1:05:36
1:05:36
Play later
Play later
Lists
Like
Liked
1:05:36Hear from host Paul Spain and business advisor Jason Langley, as Jason shares insights into business leadership, reflecting on his experiences and evolving role as an independent business advisor. They also delve into various topics and tech news including: 2degrees and Spark satellite-to-mobile news Ambitious plans for a power cable linking New Ze…
…
continue reading

1
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397
1:58:32
1:58:32
Play later
Play later
Lists
Like
Liked
1:58:322025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilie…
…
continue reading

51
New Ransomware As A Service Threats: Cyber Security Today for March 10, 2025
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19This episode also covers recent ransomware as a service (RaaS) trends, including the rise of SpearWing and Akira groups, advanced ransomware techniques exploiting IoT vulnerabilities, and issues with the ESP32 microcontroller's hidden commands. Additionally, Signal President Meredith Whitaker warns about privacy risks in agentic AI systems. Tune in…
…
continue reading

1
Ransomware Attacks a Decade In: What Changed? What Didn't? - Mike Mitchell - ESW #397
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:542025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilie…
…
continue reading

1
Where Ransomware and Geopolitical Tensions Intersect
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26In the latest episode of the TechSpective Podcast, I sit down with Anthony Freed, Director of Research Communications at Halcyon, to dive deep into the ever-evolving ransomware landscape. We explore how ransomware has transformed from a financial cybercrime tool into […] The post Where Ransomware and Geopolitical Tensions Intersect appeared first o…
…
continue reading

1
Workers hope to steer giant Southern EV battery plant toward unionization
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54The electric vehicle industry in the Southeast is growing rapidly, with increased sales, charging stations and manufacturing. Buoyed by notable victories in the last couple of years, the United Auto Workers union is revving up efforts to organize the EV and battery sector in the South. One target is a sprawling campus in rural Kentucky that, once c…
…
continue reading

1
We need better detection feedback loops - Michael Mumcuoglu - ESW #399
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34It feels like forever ago, but in the mid-2010s, we collectively realized, as an industry, that prevention was never going to be enough. Some attacks were always going to make their way through. Then ransomware got popular and really drove this point home. Detection engineering is a tough challenge, however. Where do we start? Which attacks should …
…
continue reading

1
Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399
1:50:43
1:50:43
Play later
Play later
Lists
Like
Liked
1:50:43What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399
1:50:43
1:50:43
Play later
Play later
Lists
Like
Liked
1:50:43What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Oracle Has One Of The Largest Supply Chain Breaches: Cyber Security Today For March 24, 2025
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56In this episode of 'Cybersecurity Today,' host Jim Love covers several major cybersecurity events. A devastating breach at Oracle Cloud Infrastructure has exposed 6 million records affecting 140,000 businesses, linked to a threat actor known as Rose87168. The attack exploited vulnerabilities in Oracle Fusion Middleware 11G. New browser-in-the-middl…
…
continue reading

1
Ep. 298 - The 4th Monday Series - Top Tips for Investing Intelligently with Nancy Hecht
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Nancy Hecht. Nancy started in the …
…
continue reading

1
SANS Stormcast Monday Mar 24th: Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Critical Next.js Vulnerability CVE-2025-29927 A critical vulnerability in how the x-middleware-subrequest header is verified may lead to bypassing authorization in Next.js applications. https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw http…
…
continue reading

1
Building the SOC of the Future - JP Bourget - ESW #399
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Please enjoy this encore of Career Notes. Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and…
…
continue reading

1
292: Avoiding Cyber Disaster: Is Your Company DORA Compliant? - N2WS
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions' cybersecurity. He highlights cloud-native backup strategies, cross-region and cross-account backups for disaster recovery, and the critical role of immutable backups against ransomw…
…
continue reading

1
Excel-lerating cyberattacks. [Research Saturday]
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities…
…
continue reading

1
The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions: Cyber Security Today
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions In this episode of 'Cybersecurity Today,' host Jim Love discusses the rising trends and severe impacts of cyber attacks on K-12 schools with Randy Rose, VP of Security Operations and Intelligence at the Center for Internet Security (CIS). They scrutinize recent studies showin…
…
continue reading
This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities…
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading
Over 150 government database servers are dangerously exposed to the internet. Threat actors are exploiting a vulnerability in CheckPoint’s ZoneAlarm antivirus software. Albabat ransomware goes cross-platform. ESET reports on the Chinese Operation FishMedley campaign. VanHelsing ransomware targets Windows systems in the U.S. and France. CISA issues …
…
continue reading

1
A Pragmatic Approach to Effective Security
42:14
42:14
Play later
Play later
Lists
Like
Liked
42:14Cybersecurity is constantly evolving, and staying ahead of threats requires more than just tools—it demands strategy, leadership, and expertise. The unfortunate reality is that the threat landscape affects all companies regardless of industry or size, but many companies simply do […] The post A Pragmatic Approach to Effective Security appeared firs…
…
continue reading

1
Bytes: Week in Review — Nvidia’s new bot, evaluating AI models in health care, and a health tech company preps its IPO
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45The stock market has been a tad volatile lately. But this month, the digital physical therapy company Hinge Health filed for an initial public offering. Plus, a new tool out of Stanford University evaluates how various AI models perform in real-world health care. It grades them on tasks from patient education to clinical note generation. But first,…
…
continue reading

1
IBM's Operating System Is A Perfect 10 - In Terms of Cybersecurity Vulnerability. Cyber Security Today for March 21, 2025
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09Cybersecurity Today: Critical IBM AIX Vulnerability and Major Browser Exploits Revealed In this episode, host Jim Love discusses pressing cybersecurity issues, including IBM's AIX operating system scoring a perfect 10 in security vulnerability, leaving critical sectors exposed to remote attacks. The episode also covers the mishandling of sensitive …
…
continue reading

1
SANS Stormcast Friday Mar 21st: New Data Feeds; SEO Spam; Veeam Deserialization; IBM AIX RCE;
8:24
8:24
Play later
Play later
Lists
Like
Liked
8:24Some New Data Feeds and Little Incident We started offering additional data feeds, and an SEO spamer attempted to make us change a link from an old podcast episode. https://isc.sans.edu/diary/Some%20new%20Data%20Feeds%2C%20and%20a%20little%20%22incident%22./31786 Veeam Deserialization Vulnerability Veeam released details regarding the latest vulner…
…
continue reading
This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
…
continue reading