A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
Bug Bounty Podcasts
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A Podcast about bugs, bounties and its researchers. Hosted by Fisher.
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
We’re planting the seeds of fun with the only gardening podcast that’s just for kids! Welcome to Gro-Town where we celebrate the world outside our windows! Join Miss Danielle for growing tips, music, special guests, and a bounty of laughs along the way. Music. Garden. Community. Gro-Town! Continue the fun at https://www.gro-town.com/
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Behind The Bounty gives you an inside look at the community and people that make bug bounties happen. Hosted by Ben Sadeghipour (NahamSec) and Nathanial Lattimer (d0nut).
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Talk of the Apple Community
…
continue reading
The talk of the Apple Community
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Welcome to eCommerceAholic, where we help you get more from your eCommerce store.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
…
continue reading
A podcast about the makers and breakers shaping cybersecurity. New episodes every other Monday! Go to https://hackerculture.fm for more information!
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
…
continue reading
STEM brother Basir Vincent podcast sharing small connect with the Tech bytes to encourage thought about STEM and STEAM engagement. Cover art photo provided by Oliver Pecker on Unsplash: https://unsplash.com/@ollipexxer
…
continue reading
Building better software, one incident at a time. Host Kevin Riggle talks with software engineers about that time they broke production. Whether you're an industry professional, or just curious about what makes the modern Internet run and what happens when it breaks, we bring you stories you haven't heard elsewhere. This is the audio version of the podcast. Watch on YouTube: https://youtube.com/@critical-point Produced by Complex Systems Group (https://complexsystems.group). Part of Critical ...
…
continue reading
Join us as we watch and discuss the entire Star Wars Canon from The Phantom Menace to the Force Awakens and beyond! Co-hosts Mondo, Joe (both from Not the Show) and with Ty (from Geek Fight Club's Chaos Inc.) talk about what they love and hate about The Saga.
…
continue reading
An insanely enjoyable Bitcoin podcast with a strong focus on liberty. Every Thursday, we chat about how Bitcoin sets the world free and share the latest cryptocurrency news and general Bitcoin talk. Guests have included: - Mastering Bitcoin author Andreas Antonopoulos - Liberty.me CLO Jeffrey Tucker - Antiwar.com editor Angela Keaton - Bitcoin/liberty activist Michele Seven - Jason King from Sean's Outpost Homeless Outreach - Drew Phillips from Bitcoin Not Bombs - Numerous other Bitcoin-lovi ...
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
continue reading
1
Episode 146: Hacking Horror Stories
1:50:38
1:50:38
Play later
Play later
Lists
Like
Liked
1:50:38Episode 146: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn all sit down to celebrate the spooky season by swapping their scariest bug stories. From frightening fails and firings to hacks with chilling and critical consequences. Grab your flashlight and a blanket for this one! Follow us on twitter at: https://…
…
continue reading
1
MacVoices #25266: Live! - Apple’s AI Vision Acquisition, Bug Bounties, and Teens and iPhones
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25Apple’s reported acquisition of Prompt.ai’s team/IP drew thoughts from the MacVoices panel about what it could mean for computer vision across Face ID, HomeKit, a rumored HomePod with a screen, and even a home robot. Chuck Joiner, Dave Ginsburg, Brian Flanigan-Arthurs, Jim Rea, Marty Jencius, and Norbert Frassa debate Apple’s new $2M bug bounty—pro…
…
continue reading
1
MacVoices #25266: Live! - Apple's AI Vision Acquisition, Bug Bounties, and Teens and iPhones
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26Apple's reported acquisition of Prompt.ai's team/IP drew thoughts from the MacVoices panel about what it could mean for computer vision across Face ID, HomeKit, a rumored HomePod with a screen, and even a home robot. Chuck Joiner, Dave Ginsburg, Brian Flanigan-Arthurs, Jim Rea, Marty Jencius, and Norbert Frassa debate Apple's new $2M bug bounty—pro…
…
continue reading
1
Checklist 445 - Ransomware Revisited and a Bigger Bug Bounty
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55Apple is increasing bug bounties for good guys, in theory. We'll talk about how much white hats might be able to get outta Cupertino. First though, Japan's beer bungle was a ransomware attack. An update on that and the changing state of cyberattacks on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.c…
…
continue reading
1
More Cl0p Clues and Huge Apple Bug Bounty Changes
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts. Plus: Does Dennis have a dog yet? https://security.apple.com/blog/apple-security-bounty…
…
continue reading
1
MacVoices #25274: Live! - More on John Prosser, ChatGPT Atlas Live, and A Real Tilly Norwood
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18The Jon Prosser saga continues: missed deadlines, Apple pushing toward default judgment, and why Cupertino may "make an example" of John (citing Think Secret history), Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Jim Rea, Eric Bolden, Jeff Gamet, Guy Serle, and Web Bixby examine where it is going, then do an impromptu hands-…
…
continue reading
1
OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48Three Buddy Problem - Episode 70: Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets…
…
continue reading
1
Checklist 447 - iPhone Protections and Ghost Accounts
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45It's Halloween! There's a guy with an axe who wants to get into your iPhone! We'll talk about keeping him out. Plus - ghosts may not be real, but ghost accounts are. We'll tell you how to be a ghost account buster on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with u…
…
continue reading
1
Shadow AI Is Eating the World, the Return of Hacking Team, and the Commercial Spyware Landscape
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28We don't do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we're just repeating the mistakes of previous tech waves in ignoring security until it's too late. Then we dig into a new report from Kaspersky about a crazy exploit they discovered…
…
continue reading
1
MacVoices #25273: Live! - Apple TV and Sports, Vision Pro App, and Jane Goodall
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Apple's growing focus on sports with new Apple Sports app updates and its upcoming F1 broadcasting deal is the focus of the MacVoices Live! session with Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Jim Rea, Eric Bolden, Jeff Gamet, Guy Serle, and Web Bixby. The panel examines the Vision Pro app's arrival on iPad, and reacts …
…
continue reading
1
MacVoices #25272: MacVoices Update - 2025-10
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39October marks 20 years of the show’s conversations, insights, and Apple community connections. Chuck reflects on the milestone and previews November’s holiday gift guides. He also discusses MacVoices Magazine as a source for curated Apple how-tos delivers the monthly Support Report. Show Notes: Chapters: Links: MacVoices Celebrates 20 Years: A Lega…
…
continue reading
1
MacVoices #25217: TV+Talk - Apple TV Rebrand, The F1 Movie and F1 Racing, Streaming Wars
42:24
42:24
Play later
Play later
Lists
Like
Liked
42:24Charlotte Henry and Chuck Joiner unpack Apple’s move to rebrand Apple TV+, its exclusive U.S. Formula 1 deal, and the larger implications for sports streaming. They explore the tie-in with the F1 movie, Apple’s departure from MLB, and new bundling strategies with Peacock. Charlotte also previews her new book Streaming Wars, offering a big-picture l…
…
continue reading
1
MacVoices #25272: MacVoices Update - 2025-10
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40October marks 20 years of the show's conversations, insights, and Apple community connections. Chuck reflects on the milestone and previews November's holiday gift guides. He also discusses MacVoices Magazine as a source for curated Apple how-tos delivers the monthly Support Report. http://traffic.libsyn.com/maclevelten/MV225272.mp3 Show Notes: Cha…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
continue reading
1
MacVoices #25271: TV+Talk - Apple TV Rebrand, The F1 Movie and F1 Racing, Streaming Wars
42:25
42:25
Play later
Play later
Lists
Like
Liked
42:25Charlotte Henry and Chuck Joiner unpack Apple's move to rebrand Apple TV+, its exclusive U.S. Formula 1 deal, and the larger implications for sports streaming. They explore the tie-in with the F1 movie, Apple's departure from MLB, and new bundling strategies with Peacock. Charlotte also previews her new book Streaming Wars, offering a big-picture l…
…
continue reading
1
#69 Why He Left a Safe Job to Hack Companies for a Living ft. Jim Schultz
33:13
33:13
Play later
Play later
Lists
Like
Liked
33:13In this episode of The Hacker’s Cache, Kyser Clark sits down with Jim Schultz, an OSCP-certified penetration tester, cybersecurity instructor, and consultant with over 15 years of experience. Jim shares his journey from taking apart his first family computer in the 90s to teaching hundreds of students and returning full-time to the world of ethical…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC (#)
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
…
continue reading
1
MacVoices #25270: Live! - The AWS Outage, Juice Jacking, Apple’s Value, and the Steve Jobs Coin
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39An in-depth panel discussion explores the major AWS outage and its ripple effects across businesses, Amazon devices, and essential services, raising concerns about redundancy and cloud dependency. Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Jim Rea, Eric Bolden, Jeff Gamet, Guy Serle, and Web Bixby group also examine Apple’…
…
continue reading
In this episode, Seth and Ken debate OpenAI's Atlas browser, which embeds AI into web browsing. Ken views it as a major privacy concern, potentially accelerating invasive data collection and surveillance. Seth noted that new browsers historically have critical flaws. They acknowledged that AI is very useful for generic and technical internet search…
…
continue reading
It's our 3rd annual Halloween Harvest episode! Today we'll learn how popcorn goes from soil to snack as Miss Danielle welcomes Annette Hill from Brown Bag Popcorn! Announcer Guy takes on a tour of...turnip carving?? Plus, a visit from Gro-Town's favorite grocery store worker, Mr. Bruce, on the only gardening podcast that's just for kids, Gro-Town! …
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
continue reading
1
MacVoices #25269: Briefing - The AirCard Pro Bluetooth Tracker from Rolling Square
4:28
4:28
Play later
Play later
Lists
Like
Liked
4:28Chuck relates his experience with the Rolling Square AirCard Pro —a slim, credit-card-sized Bluetooth tracker compatible with Apple’s Find My network. With a rechargeable 12-month battery, Qi charging, and optional QR ID, it is an ideal compact Bluetooth tracker with a flat form factor. Show Notes: Chapters: [0:00] Introduction and why a physical w…
…
continue reading
1
MacVoices #25269: Briefing - The AirCard Pro Bluetooth Tracker from Rolling Square
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29Chuck relates his experience with the Rolling Square AirCard Pro —a slim, credit-card-sized Bluetooth tracker compatible with Apple's Find My network. With a rechargeable 12-month battery, Qi charging, and optional QR ID, it is an ideal compact Bluetooth tracker with a flat form factor. Show Notes: Chapters: [0:00] Introduction and why a physical w…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
1
MacVoices #25268: CarPlay Ultra Supporters, California Regulates ChatBots, Amazon Disarms James Bond
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08This session starts with a discussion of the expansion of Apple’s CarPlay Ultra and which automakers are committing or holding back, highlighting Hyundai’s early adoption. Chuck Joiner, Dave Ginsburg, Brian Flanigan-Arthurs, Jim Rea, Marty Jencius, and Norbert Frassa examine California’s new chatbot regulations following tragic incidents, questioni…
…
continue reading
1
Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA
2:11:23
2:11:23
Play later
Play later
Lists
Like
Liked
2:11:23Three Buddy Problem - Episode 69: We dig into news that Apple's iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters. Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit develo…
…
continue reading
1
US Cybersecurity Going in Reverse, the AWS Outage, and is CISA Okay
43:35
43:35
Play later
Play later
Lists
Like
Liked
43:35This week saw a blessed lack of major vulnerabilities, but there was plenty of other news to dig into. We discuss the fallout from the AWS outage (0:36), the conclusions from the latest Cyberspace Solarium Commission report (4:37), and the effects of CISA's shakeup on the private sector (14:07), and the continued effects of the F5 incident (21:21).…
…
continue reading
1
Checklist 446 - Meta Warnings and Merit Badges
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55Meta's WhatsApp and Facebook Messenger are taking proactive steps to warn users of scammers on those services. We'll tell you more. Plus - Scouting America has new merit badges for A.I. and cybersecurity. We'll talk about those on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get i…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
continue reading