The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Breach Analysis Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Giving my thoughts on politics and culture from southern Africa, as well as interviews with interesting thinkers and doers.
…
continue reading
The Fraudian Slip Podcast from the ITRC
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
A podcast about the dark and grim universe of the Five Nights at Freddy's franchise. Detailed storytelling of the world, monsters, and events that make up the lore of this indie cult-classic horror game series. Symbolism, theories, science and paranormal magic adventures await. Will you choose to take a trip Into the Night?
…
continue reading
Welcome to Clique Bait—the podcast where we stay Fairly Local, dig into the Lore, and ask the big questions like… What’s the story behind the antlers? Why is there duct tape on everything? And how many layers deep is this metaphor, Tyler? If you’ve ever cried in the car to Oldies Station, screamed Heavydirtysoul at a concert, or blacked out your hands for a Blurryface show—you’re in the right place! Every week, we’ll bring you The News—from tour announcements to easter eggs hiding in social ...
…
continue reading

1
The Weekly Breach Breakdown: ITRC H1 2025 Data Breach Analysis – Key Findings & Takeaways – S6E22
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59Welcome back to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown, supported by Sentilink. I’m James E. Lee, the ITRC’s President, and this is the episode for July 18, 2025. Each week, we take a look at the latest news and trends related to data security and privacy. This week, the ITRC released our H1 2025 Data Breach Analysis th…
…
continue reading

1
Ep. 219 - South Africa's worst diplomatic crisis post-1994 | Byron Shepherd
1:09:45
1:09:45
Play later
Play later
Lists
Like
Liked
1:09:45I am joined by economist, political commentator, and host of Morning Shot, Byron Shepherd to discuss the diplomatic crisis that has unfolded so far between the ANC-led South African government and the Trump administration. We discuss sanctions, tariffs, "misinformation," media capture, and more.By Ernst J. van Zyl
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
…
continue reading

1
THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY | S1 EP3
54:25
54:25
Play later
Play later
Lists
Like
Liked
54:25THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vuln…
…
continue reading

1
SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
…
continue reading

1
The Weekly Breach Breakdown Podcast: 123456 – Weak Password Leads to McDonald’s Data Breach - S6E24
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Welcome to the Identity Theft Resource Center's (ITRC’s) Weekly Breach Breakdown for August 8, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations of the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we a…
…
continue reading

1
From Fairy Tales to Breach: Trash Dragon in the twenty one pilots Lore & Anathema Deep Dive
1:15:11
1:15:11
Play later
Play later
Lists
Like
Liked
1:15:11In this packed episode, we dive deep into the layered world of twenty one pilots exploring everything from mythic dragons to unreleased music and mental health themes. First, we unpack the lore of Trash Dragon, a mysterious symbol from the Scaled and Icy era. Did you know this dragon may have roots in a fairytale illustrated by Walter Crane, a prop…
…
continue reading

1
SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
…
continue reading

1
Ep. 218 - The father of Afrikaner republicanism: Paul Kruger | Frans de Klerk (Orania)
49:52
49:52
Play later
Play later
Lists
Like
Liked
49:52I am joined by Frans de Klerk, the Communications Official for the Orania Movement, to discuss Paul Kruger, the State President of the ZAR Boer Republic between 1883 to 1900, his legacy, and Orania's plan to erect a statue to Kruger on their new town square. Support the statue initiative here: https://orania.co.za/paul-kruger/…
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
…
continue reading

1
Ep. 217 - South Africa: Organised communities versus organised crime | Jacques Broodryk (AfriForum)
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44I am joined by Jacques Broodryk, Chief Spokesperson for AfriForum Community Safety, do tackle some tough questions surrounding community safety structures, organised crime in South Africa, and how to fight back effectively.By Ernst J. van Zyl
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
…
continue reading

1
SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
…
continue reading

1
S1E2 | The SolarWinds Hack: How 18,000 Orgs Were Compromised | w/ Alberto Deto Hassan
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24🎙️ The CISO Signal | S1E2 — The SolarWinds Hack: How 18,000 Orgs Were Compromised One trusted software update. Thousands of victims. A breach that changed the cybersecurity landscape forever. In this episode, we investigate the SolarWinds supply chain attack, a nation-state cyber operation that exposed the deep fragility of the modern software ecos…
…
continue reading

1
William Afton Character Analysis - The Spirit of Cain (Shadow Scrying)
53:00
53:00
Play later
Play later
Lists
Like
Liked
53:00William Afton, the man behind the slaughter. The main antagonist behind almost every dark deception within Five Nights at Freddy's. From his early appearances as the Purple Guy in FNAF 2, to his grotesque resurrection as Springtrap, and as the cunning corporate figurehead of Fazbear Entertainment, Afton has taken on many forms—but all serve one pur…
…
continue reading

1
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
…
continue reading

1
The Weekly Breach Breakdown Podcast by ITRC: Prime Target - S6E23
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Welcome to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown for August 1, 2025. I’m Timothy Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we examine the latest events and trends in data security and privacy.This week, we’re looking at an Amazon phishing scam that could impact more than 200…
…
continue reading

1
Unmasking Lisden & Sacarver: Final DEMA Bishop Breakdown + ‘Days Lie Dormant’ & ‘Tear in My Heart’ Analysis
1:02:30
1:02:30
Play later
Play later
Lists
Like
Liked
1:02:30In this jam-packed episode of our twenty one pilots-focused podcast, we wrap up our deep dive into the mysterious world of the DEMA Bishops with an in-depth look at Lisden and Sacarver, and a quick look at Nills, Listo, and Vetomo. What roles do they play in the DEMA narrative? How do they connect to the band’s evolving lore? We explore it all—and …
…
continue reading

1
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
…
continue reading

1
SANS Stormcast Wednesday July 30th, 2025: Apple Updates; Python Triage; Papercut Vuln Exploited
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
…
continue reading

1
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
…
continue reading

1
SANS Stormcast Monday, July 28th, 2025: Linux Namespaces; UI Automation Abuse; Autoswagger
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
…
continue reading

1
SANS Stormcast Friday, July 25th, 2025: ficheck.py; Mital and SonicWall Patches
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
…
continue reading

1
DEAD IN THE WATER | Maersk, Sandworm, and the $10 Billion Breach
36:09
36:09
Play later
Play later
Lists
Like
Liked
36:09The CISO Signal | S1E1: DEAD IN THE WATER | How Sandworm Crippled Maersk — The $10 Billion Breach In this premiere episode of The CISO Signal, we uncover the chilling true cybercrime story of the NotPetya attack — a weaponized piece of malware launched by the Russian state-backed hacking group Sandworm, which brought Maersk, the world’s largest shi…
…
continue reading

1
BREAKING DOWN the BREACH Tracklist: twenty one pilots Lore, Tour Predictions & More!
1:19:35
1:19:35
Play later
Play later
Lists
Like
Liked
1:19:35Calling all Skeleton Clique members! In this episode, we dive deep into the freshly revealed tracklist for BREACH, the highly anticipated new album from twenty one pilots. From mysterious titles to potential narrative clues, we analyze each song and what it might mean for the band’s evolving storyline. But that’s not all—we also explore how BREACH …
…
continue reading

1
SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise;
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
…
continue reading

1
The Fraudian Slip Podcast: Ride or AI – Impacts of AI on Identity Theft, Fraud and Scams - S6E7
30:15
30:15
Play later
Play later
Lists
Like
Liked
30:15Welcome to the Fraudian Slip, the Identity Theft Resource Center’s (ITRC) podcast, where we talk about all things identity theft, fraud and scams that impact people and businesses. You’ve probably heard of Ride or Die, one of those slang terms that seems to be everywhere at one time or another. Today, the phrase you can’t escape no matter how hard …
…
continue reading

1
Ep. 216 - Separating fact from fiction on the ground in South Africa | Derek VanBuskirk (Daily Caller)
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22American investigative journalist Derek VanBuskirk (The Daily Caller) chats to me about his recent visit to South Africa to investigate farm murders, Orania, claims of genocide, President Donald Trump's statements on South Africa and the government, AfriForum, and more.By Ernst J. van Zyl
…
continue reading

1
SANS Stormcast Wednesday, July 23rd, 2025: Sharepoint 2016 Patch; MotW Privacy and WinZip; Interlock Ransomware; Sophos Patches
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
…
continue reading

1
SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading

1
Bishop Keons Explained: twenty one pilots Lore, Clancy’s Storyline, and a Deep Dive into ‘Forest’
1:09:08
1:09:08
Play later
Play later
Lists
Like
Liked
1:09:08***SPOILER ALERT*** If you listen with kids, Tee spills the beans about Santa and his reality in the one-hour and three minutes mark, so be sure to skip that 30 seconds or so! This week, discover the hidden meaning behind Bishop Keons and his role in twenty one pilots’ Clancy storyline. In this episode, we break down key lore connections, theories,…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading

1
The Tracklist - A Bonus Episode! - twenty one pilots Releases the Breach Tracklist and We Are Here For It!
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Frens! The Breach tracklist was literally spoon-fed to us by Tyler himself and no one freaking believed him!!! Well, now it's official, again by Tyler himself, and we have no choice but to talk about it with you! More in-depth chatter will be coming with next week's episode, but today we are sharing our initial thoughts on the teasers and all thing…
…
continue reading

1
Episode 39 - The Episode Where Roxy Gets Hit By A Car (Part XVIII: Security Breach Finale)
1:34:33
1:34:33
Play later
Play later
Lists
Like
Liked
1:34:33This is the episode where Roxy gets hit by a car. After retrieving the refurbished STAFF Bot head from DJ Music Man’s Fazcade, Gregory sets a trap to take down Roxanne Wolf and claim her experimental eyes. With all the Glamrock Animatronics now decommissioned and the clock ticking toward 6AM, Gregory has one final chance to escape Freddy Fazbear’s …
…
continue reading

1
Ep. 215 - Out with the old, in with the new media | Renaldo Gouws
54:42
54:42
Play later
Play later
Lists
Like
Liked
54:42I am joined by political commentator and former member of the South African parliament Renaldo Gouws to discuss the latest developments in the South African media and social media landscapes.By Ernst J. van Zyl
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches;
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
…
continue reading

1
The Weekly Breach Breakdown Podcast by ITRC: Spider Bites – S6E21
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53NOTE: Police in the UK have indicted four members of Scattered Spider. The suspects — two 19-year-old men, a 17-year-old man and a 20-year-old woman — are being held on suspicion of violating the Computer Misuse Act, blackmail, money laundering and participating in organized crime activities, according to the NCA. For more information, click here: …
…
continue reading

1
Empty Set: The Bishops & Their Role in the twenty one pilots Lore, Breach Tour Theories, & "The Outside" Analysis
1:11:09
1:11:09
Play later
Play later
Lists
Like
Liked
1:11:09In this episode, our Lore Deep Dive takes to the nine bishops and their real-world connections to the Nicolas Bourbaki Group (why is Tyler so dang smart?!). We also explore some Breach Tour theories, will there be another single, and did the boys actually almost break up in 2016?! An in-depth analysis of "The Outside" and its possible connection to…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack;
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
…
continue reading

1
The Weekly Breach Breakdown Podcast by ITRC: A Tale of Two Breaches - S6E20
3:28
3:28
Play later
Play later
Lists
Like
Liked
3:28Welcome to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown for July 3, 2025. I’m Timothy Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we break down the latest data security incidents making headlines. Today, we’re focusing on a significant lawsuit settlement— the AT&T data privacy settle…
…
continue reading