Podcast by VanRidd Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
This is an informative and fun podcast about WiFi, but not limited solely to wireless networking technology. We hope to stir up a bit of contention with our podcast and bring new ideas and viewpoints to wireless professionals everywhere!
…
continue reading
Arlo’s security cameras are one of the best security cameras in the market today, and setting them up & installing it is a breeze. If you`ve recently bought arlo camera and looking for arlo camera setup instructions then this guide will walk you through step by step process for how to Set Up & Install your Arlo Camera Security System in few simple steps.This will also help you solve if your arlo camera will not connect to wifi during setup because there is a solution to everything. If you`re ...
…
continue reading
https://youtu.be/NgggZ_3ZBGgIn this daily security byte with WatchGuard CSO, Corey Nachreiner, he explains the recent Global IT outage cause by a CrowdStrike update. We also follow-up on RockYou and the RockYou2024 data dump of 10 billion recordsBy Secplicity
…
continue reading
https://youtu.be/wozYlHlPPmEThis week on the podcast we discover the newly-disclosed protocol vulnerability in certain RADIUS implementations. Before that, we give an update on the continued fallout from the Snowflake customer databreaches including a new disclosure from AT&T. We also discuss a blog post from JFrog that details how they saved the w…
…
continue reading
https://youtu.be/p_zv9TEIZO0This week on the podcast, we cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the us, a Korean internet service provider delivering malware to their customers, and a takeover of a popular J…
…
continue reading
https://youtu.be/Pxh2VhwkHrEThis week on the podcast we doscuss two issues from this month's Microsoft patch tuesday that deserve your attention. After that we discuss the recent data theft campain targeting Snowflake customers that has impacted over 100 organizations. We end the episode with an update on the hackers behind the MGM and Caesar's Ent…
…
continue reading
https://youtu.be/jE2m_BO_yyYThis week on the podcast we cover the WatchGuard Threat Lab's Internet Security Report from Q1. In this episode, we discuss the latest trends in malware detections at the network and the endpoint, network attack trends, and malicious domains that targeted WatchGuard customers around the world.…
…
continue reading
https://youtu.be/jxnYFdY-3P0This week on the podcast, we discuss a new Microsoft Windows feature that is shaping up to be a security nightmare. Before that, we discuss a new research initiative from the Advanced Research Projects Agency for Health (ARPA-H) that could make big improvements in healthcare cybersecurity.…
…
continue reading
https://youtu.be/b_KBOKn1IPoThis week on the podcast, we cover a newly disclosed weakness in the 802.11 Wi-Fi standard that affects common enterprise Wi-Fi deployments. Before that, we discuss CISA's Secure by Design Pledge for technology vendors before ending with a Microsoft research post on Quick Assist social engineering.…
…
continue reading
https://youtu.be/uo9m0hHQua4In a very special episode of #the443Podcast, WatchGuard Director of Security Operations, Marc Laliberte sits down with Seattle Kraken Cybersecurity Engineer, Ryan Willgues to discuss how Ryan got his start in IT, what it’s like working for an NHL franchise, how the Kraken have deployed WatchGuard’s Unified Security Platf…
…
continue reading
https://youtu.be/SF_42g-BYzMThis week on the podcast, we cover guidance from CISA and its international partners that guides organizations on the right questions to ask during the technology procurement process to make sure the products they buy are secure. Before that, we cover Microsoft's research into a common vulnerability impacting over 4 bill…
…
continue reading
https://youtu.be/dwRG_wO0vgcThis week on the podcast, we cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, we discuss what we learned from United Healthcare CEO Andrew Witty's congressional testimony on their ransomware attack in February. We also discuss a research article from JFrog on malicious Docker …
…
continue reading
https://youtu.be/GnxViRW1A24This week on the podcast, we cover a nation-state backed attack against Cisco ASA appliances which Cisco TALOS themselves have dubbed "ArcaneDoor." After that, we discuss a phishing tookit being used to target LastPass users before ending with a new way to deliver malware payloads using legitimate services.…
…
continue reading
https://youtu.be/3fX7LRXi74IThis week on the podcast, we cover a research post that describes a code injection vulnerability caused by the way nearly every high level programming language runs on Windows. We also discuss a series of vulnerabilities in LG televisions that allow remote attackers to root the device before ending with a chat about new …
…
continue reading
https://youtu.be/0860ZmM1vgEThis week on the podcast, we cover a software supply chain attack years in the making that was days away from a devastating global impact. After that, we cover Facebook's Project Ghostbusters and its impact on user privacy before ending with another software supply chain attack that successfully compromised developers in…
…
continue reading
https://youtu.be/VqFnomsJzdAThis week on the podcast we discuss a vulnerability in required commercial truck hardware that could enable an automatically propagating worm across the entire US. Before that, we cover Apple's "un-patchable" vulnerability in their M-series processors as well as a vulnerability that could let attackers unlock hotel room …
…
continue reading
https://youtu.be/iYM3y85hEkMThis week on the podcast, we're joined by Ryan Estes, a member of WatchGuard's Zero-Trust Application Service classification team and resident ransomware expert to discuss the wild month in ransomware news. We start the episode with a story about a fake ransomware operator that scammed cybercriminals out of tens of thous…
…
continue reading
https://youtu.be/GaX_8NOoq7wThis week on the podcast, we cover an international law enforcement takedown of the LokBit ransomware group's infrastructure. After that, we cover a novel malware delivery vector involving an IoT "toy." We end the podcast by covering the latest White House Executive Order addressing cybersecurity in critical infrastructu…
…
continue reading
https://youtu.be/3SY1sDF-BA0This week on the podcast we cover Canada's attempt to ban the Flipper Zero. Before that, we review a recent research post on a new class of vulnerability on the Ubuntu operating system. We end the episode with a chat bout a the impacts of artificial intelligence on data security.Menlo Report on Business AI Usage - https:…
…
continue reading
https://youtu.be/VfKlq6DisLYThis week on the podcast, we cover a recent news post about an army of 3 million compromised toothbrushes taking down a Swiss website, causing millions in damages. After that, we discuss the United States DOJ's latest botnet takedown, this time targeting Volt Typhoon. We end the episode by walking through a CISA joint-pu…
…
continue reading
https://youtu.be/MY4TpiL76gYThis week on the podcast, we cover Apple's recent announcement describing how they will comply with the European Union's new Digital Markets Act and what that means for the iPhone walled garden. Before that, we cover a databreach at Mercedez-Benze thanks to an alternative authentication method. Additionally, we cover the…
…
continue reading
https://youtu.be/fdAjMPAV6CMThis week on the podcast, we cover two "Blizzard" threat actors targeting governments and private organizations. We also give an update to the SEC's compromised Twitter/X Account, and then end with a discussion of an EU program designed to improve their citizen's privacy while browsing the internet.…
…
continue reading
On this episode of J Bobby & Van we discuss Yasiin Bey's comments about Drake, Playboi Carti's newest music, Mia Khalifa and more! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
https://youtu.be/jG3mwjCLpJQThis week on the podcast, we review a CISA and FBI joint advisory on the Androxgh0st malware. Before that we cover recent Volt Typhoon activity targeting SMB routers exposed on the internet. We end the episode with a fun research blog post about a series of flaws in an Indian insurance provider.…
…
continue reading
https://youtu.be/3E_Ei9hgNzAThis week on the podcast, we review NIST's new publication that defines a taxonomy for how we talk about Adversarial Machine Learning. Before that, we cover a recent discovery of threat actors retaining access to Google accounts even through a password reset. We round out the episode with an account compromise that lead …
…
continue reading
https://youtu.be/VK1QoxLP16YThis week, we cover a password compromise that lead to a mobile telco in Spain losing control of their IP address space. We also give a quick update on the Lapsus$ ringleader's court case before discussing a recently discovered macOS backdoor malware that evades most endpoint protection. We end the episode by covering Mi…
…
continue reading
1
J Bobby & Van: Episode 2 (Katt In The Hat)
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01
On this edition of J Bobby & Van, we discuss Katt Williams on Club Shay Shay, 90's sitcoms, the difference in generations, dating in our 30's and more! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
https://youtu.be/YZLayuDJyykThis week on the podcast, we cover a supply chain attack against one of the largest hardware cryptocurrency wallet manufacturers. After that, we discuss the latest Apache Struts vulnerability under active exploit by threat actors. We end the episode with our thoughts on a research blog post about a set of threat actors u…
…
continue reading