The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
  continue reading
Breach Analysis Podcasts
A podcast about the dark and grim universe of the Five Nights at Freddy's franchise. Detailed storytelling of the world, monsters, and events that make up the lore of this indie cult-classic horror game series. Symbolism, theories, science and paranormal magic adventures await. Will you choose to take a trip Into the Night?
…
  continue reading
The Fraudian Slip Podcast from the ITRC
…
  continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
  continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
  continue reading
Political Editor Robert Peston and News At Ten Anchor Tom Bradby discuss and debate all the key talking points of the political week - and answer your questions in our weekly Q&A episodes. Got a question for the team? Email [email protected] You can watch every episode on YouTube, ITVX and Spotify and listen on every podcast platform, including Apple Podcasts. Hit subscribe on any platform to ensure you don't miss an episode.
…
  continue reading
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
…
  continue reading

1
The Weekly Breach Breakdown Podcast: Step Into the Breach – Q3 2025 Data Breach Analysis - S6E31
4:50
4:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
4:50Welcome to the Identity Theft Resource Center's (ITRC’s) Weekly Breach Breakdown for October 10, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, w…
…
  continue reading

1
The Fraudian Slip Podcast: Identity Theft Resource Center – 2025 Consumer Impact Report - S6E10
23:38
23:38
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:38Welcome to the Fraudian Slip, the Identity Theft Resource Center’s (ITRC) podcast, where we talk about all things identity theft, fraud and scams that impact people and businesses. This week, we published our 2025 Consumer Impact Report by ITRC.Typically, on this podcast, we’d introduce a topic, a guest expert, and our CEO, Eva Velasquez. This mont…
…
  continue reading

1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
  continue reading

1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
  continue reading

1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
  continue reading

1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
6:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:07SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
  continue reading

1
Why Rachel Reeves is likely to raise income tax to fill Budget black hole
32:34
32:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:34In this episode of Talking Politics, Tom Bradby and political editor Robert Peston analyse the Chancellor's dwindling options for her upcoming budget and predict the impact of the decisions she might make. They discuss how Rachel Reeves will fill that multi-billion-pound hole in the country's finances, whether she will increase income tax despite p…
…
  continue reading

1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
  continue reading

1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC (#)
8:05
8:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:05SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
…
  continue reading

1
SANS Stormcast Tuesday, October 28th, 2025:  Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
  continue reading

1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
  continue reading

1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
…
  continue reading

1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
  continue reading

1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
  continue reading

1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
  continue reading

1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
  continue reading

1
The Weekly Breach Breakdown Podcast: The Stolen Goods – Pixnapping Target Android Devices - S6E33
3:48
3:48
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
3:48Welcome to the Identity Theft Resource Center's (ITRC’s) Weekly Breach Breakdown for October 24, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we will discuss pixnappi…
…
  continue reading

1
David Lammy: We can't let 'hooligans and fascists' appropriate the British flag
15:42
15:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
15:42Robert is joined by the Deputy Prime Minister David Lammy, who says he wants his children to feel "confident" in the UK and England flags. The Deputy PM - and Justice Secretary - claimed the flag was being appropriated by the far-right. He also spoke about a new AI tool being used in the justice system to help transcribe interviews. And he said it …
…
  continue reading

1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
  continue reading

1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. (#)
7:28
7:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:28SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
…
  continue reading

1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln;
6:37
6:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:37What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
…
  continue reading

1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; (#)
6:37
6:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:37SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
…
  continue reading

1
Pressure grows on the government to strip Prince Andrew of ALL his titles
44:59
44:59
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:59Tom Bradby and Robert Peston chat with Lord Simon Case, who has served as right-hand man to both Prince William and four Prime Ministers, as Cabinet Secretary. They discuss the growing pressure on the government to officially strip Prince Andrew of all his titles, including his Dukedom. Lord Case also breaks down the threat China poses to the UK an…
…
  continue reading

1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack
9:17
9:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:17Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
…
  continue reading

1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack (#)
9:17
9:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:17SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
…
  continue reading

1
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity
6:14
6:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:14TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
…
  continue reading

1
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity (#)
6:15
6:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:15SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Vi…
…
  continue reading

1
UK government used Chinese owned data centre, Cummings tells Peston
32:24
32:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:24Dominic Cummings has disclosed in an exclusive interview with ITV News that government data has been stored on infrastructure owned and controlled by Chinese interests. He told the Talking Politics podcast that he had been warned about the Chinese ownership in “early 2020”, shortly after becoming chief aide to the then Prime Minister Boris Johnson.…
…
  continue reading

1
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense
21:28
21:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:28New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
…
  continue reading

1
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense (#)
21:28
21:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:28SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense New DShield Support Slack Workspace Due to an error on Salesforce's side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploi…
…
  continue reading

1
The Weekly Breach Breakdown Podcast: NSA Popup Warning - What If You See a Suspicious Popup? - S6E32
2:53
2:53
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:53Welcome to the Identity Theft Resource Center’s (ITRC’s) Weekly Breach Breakdown for October 17, 2025. I’m Tim Walden, Communications Leader for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today we’re talking about a serious NSA…
…
  continue reading

1
SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday
8:40
8:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:40Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
…
  continue reading

1
SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday (#)
8:40
8:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:40SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ra…
…
  continue reading

1
Episode 40 - What If... (Part IXX: Security Breach Epilogue)
1:20:41
1:20:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:20:41The finale of Five Nights at Freddy’s: Security Breach is here! When 6 AM strikes in the Freddy Fazbear's Pizzaplex, Gregory faces a life-changing choice: escape to save himself, or stay with Glamrock Freddy to uncover the truth behind Vanessa and Vanny. But no matter which path he takes, does the story really end? Or is the conclusion to Security …
…
  continue reading

1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches
6:22
6:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:22Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
…
  continue reading

1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches (#)
6:22
6:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:22SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti…
…
  continue reading

1
Trump sold peace to the Middle East: but will it last?
39:19
39:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
39:19Donald Trump has hailed the Gaza ceasefire as a new dawn but what obstacles still stand in the way of lasting peace in the Middle East? A diplomatic solution has long been sort but the President has a different approach: money. Will he be able to successfully sell the commercial opportunities of peace in the long term? Robert and Tom also weigh up …
…
  continue reading

1
Welcome to the CompTIA Server+ Certification
2:08
2:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:08By Jason Edwards
…
  continue reading

1
SANS Stormcast Tuesday, October 14th, 2025: ESAFENET Scans; Payroll Priates; MSFT Edge IE Mode
6:02
6:02
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:02Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
…
  continue reading

1
SANS Stormcast Tuesday, October 14th, 2025: ESAFENET Scans; Payroll Priates; MSFT Edge IE Mode (#)
6:03
6:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:03SANS Stormcast Tuesday, October 14th, 2025: ESAFENET Scans; Payroll Priates; MSFT Edge IE Mode Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted "payroll pirate" attacks a…
…
  continue reading

1
The $25 Million Arup Deepfake: AI's Most Convincing Con
40:49
40:49
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:49The $25 Million Arup Deepfake: AI's Most Convincing Con In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account. This wa…
…
  continue reading

1
SANS Stormcast Monday, October 13th, 2025: More Oracle Patches; Sonicwall Compromisses; Unpatched Gladinet; 7-Zip Patches
5:56
5:56
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:56New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
…
  continue reading

1
SANS Stormcast Monday, October 13th, 2025: More Oracle Patches; Sonicwall Compromisses; Unpatched Gladinet; 7-Zip Patches (#)
5:56
5:56
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:56SANS Stormcast Monday, October 13th, 2025: More Oracle Patches; Sonicwall Compromisses; Unpatched Gladinet; 7-Zip Patches New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.…
…
  continue reading

1
SANS Stormcast Friday, October 10th, 2025:  RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper)
15:12
15:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
15:12Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
…
  continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike "Issues"; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) (#)
15:13
15:13
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
15:13SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike "Issues"; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
…
  continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln;
6:12
6:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:12Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
…
  continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; (#)
6:12
6:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:12SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnera…
…
  continue reading

1
The Jenrick 'white faces' race row and Badenoch's stamp duty promise
32:13
32:13
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:13What's the fallout in the Robert Jenrick 'white faces' row? And will Kemi Badenoch's offer to ditch stamp duty win over voters? In this Talking Politics, Robert Peston joins Tom Bradby from the Conservative's conference in Manchester to give expert analysis minutes after the Tory leader's speech. Got a question for Tom or Robert? Email talkingpoli…
…
  continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches
5:57
5:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:57By Dr. Johannes B. Ullrich
…
  continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches (#)
5:57
5:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:57
…
  continue reading
 
 
 
