A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
Cve Podcasts
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to Time for a Reset, the marketing podcast that gets behind the thinking of the industry’s sharpest leaders who are shaping the world’s most iconic brands. We ask the big questions: What does it take to drive real change? How do you stay ahead when the ground keeps shifting? From changing consumer expectations to marketing’s growing role on the board agenda, each episode digs into what matters now and what’s coming next. Expect smart conversations, practical takeaways, and a fresh pe ...
…
continue reading
Shannon N. Green, former director and senior fellow of the CSIS Human Rights Initiative and former managing director of CSIS’s Commission on Countering Violent Extremism (CVE), explored the violent extremism phenomenon – its causes, manifestations, and responses. In each episode, Shannon sat down with a different expert or practitioner, building a mosaic of voices and perspectives on CVE from all around the world.
…
continue reading
Exploring some of the key concepts in preventative counterterrorism work, drawing on global experience and RUSI research. Over the past few years, RUSI's Terrorism and Conflict group has conducted multiple and extensive reviews of global preventing and countering violent extremism (P/CVE) programmes, identifying what can work and what has not worked in these efforts. The research covered hundreds of programmes addressing different ideological motivations, with a particular focus on Islamist ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
This podcast network will have my main tech program when something comes out which is not security related. Sans News Bites, The Security Box, and other tech nuggets will also be here too. Some adult language may be possible in content, and a disclaimer plays on TSB as its a show on the mix. Enjoy!
…
continue reading
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
…
continue reading
Your Home for Linux-related fun and learning!
…
continue reading
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
A team of five employees of the Association of Space, Defense, Refuge, and Education were sent to the aquatic Planet 15-DS3. A research mission, a planet full of sea creatures, and one question. Is this planet a possible astrological eden, or is there a reason for the previous mission failure?
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
…
continue reading
A deeper dive into Prelude Operator platform and all things computer security
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Join hosts Eddie Knight and Josh Kelley as they look at the latest trends and current events in the industry! Whether you're new to DevOps or a veteran of the industry, this podcast will help you continuously improve your DevOps game.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
A podcast about security, human rights, conflict, and law, with an Australian and Southeast Asian focus.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
Eagle is an L.A. based hip-hop artist. On Secret Skin, he and his guests examine what’s really going on behind the face that hip-hop artists put on for the public. The in-jokes. The heavy stuff. The tour stories. The day-to-day struggles and absurdities of being a working musician. The Secret Skin.
…
continue reading
Hosted by two brothers - Adam a comedian, Thomas an economist - this show will help you understand the world of money without the need for a calculator or dictionary. Easy to understand and jargon free. Adam will ask and Thomas will answer all those money questions you've pondered but never knew who to ask. From interest rates to GDP, trade wars to house prices, the world of economics has an impact on so many aspects of our everyday lives. This podcast will break it all down as Adam and "rea ...
…
continue reading
1
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
…
continue reading
1
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847 (#)
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847 MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch…
…
continue reading
1
Sans Newsbites for December 12, 2025: CVE numbers and many CVSS scores of 9s and 10s
1:32:02
1:32:02
Play later
Play later
Lists
Like
Liked
1:32:02Hello gang, welcome to the Sans News Bites podcast covering the newsletter for December 12, 2025. I know, we should've been continuing to release, but I also have been involved in other things too and taking some time off, but we plan on catching up as there are no meetings we need to attend until next year. I've also been learning about how the RS…
…
continue reading
1
Auto Parts Giant LKQ Confirms Oracle EBS Breach, FBI Takes Down Alleged Money Laundering Operation, Cisco Warns of Unpatched AsyncOS Zero-Day, SonicWall Fixes Actively Exploited CVE
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33🎙️ Auto Parts Giant LKQ Oracle EBS Breach, FBI Takes Down Money Laundering Op, Cisco AsyncOS Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1030: Today's episode will discuss the latest news: · Critical React2Shell Flaw Exploited in Ransomware Attacks · Kims…
…
continue reading
1
Ep 15 - Part 1 - Get Comfortable Being Vulnerable: The Chaos Behind Every CVE and Every Risk
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58🎙️ Coffee, Chaos and ProdSec - Ep 15 Vulnerabilities are piling up faster than teams can read the reports, and vulnerability management is buckling under the weight. So this week, Kurt and Cameron grab their mugs and dig into why modern VM feels impossible, why severity scores mislead everyone, and how reachability and exploitability matter far mor…
…
continue reading
1
Stop Secrets Creep Across Developer Platforms
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26Developers are exposing their organizations' most sensitive information; our guests explain why it's happening and how to stop it.By InformaTechtarget
…
continue reading
1
Sans Newsletter for Dec 23, 2025is covered on this episode
2:04:37
2:04:37
Play later
Play later
Lists
Like
Liked
2:04:37Hello folks, welcome to Sans, episode 34. On this episode, we will learn about a ten year anniversary of something that a certain nation state did, Russia. Looks like we've got a couple of more breaches to talk about, and much more. While I will put in the info from the newsletter, the newsletter will have more info including links which I will not…
…
continue reading
1
We have more maximum severity bugs in the newsletter of Sans for Dec 19, 2025
1:46:34
1:46:34
Play later
Play later
Lists
Like
Liked
1:46:34Hello folks, welcome to sans, episode 33. This is going to cover the newsletter for December 19th, which means we're pretty much caught up. Yeah! would you like to view the newsletter to see what might be of interest to you? Here's the newsletter for December 19, 2025. Here is what is in the top of the news and we've got to start with yet another m…
…
continue reading
1
22.7 Million Impacted in Aflac Data Breach, Shinhan Card Data Breach, Nova Scotia Power Incident Report Confirms Cyberattack, FCC Bans Foreign Made Drones and Key Communication Equipment
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31🎙️ Aflac 2.2M Breach, Shinhan Card Data Breach, Nova Scotia Power Cyberattack, FCC Bans Foreign Drones 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1033: Today's episode will discuss the latest news: Critical MongoDB Vulnerability Threatens Database Security Threat…
…
continue reading
1
Ep 17 - Breaking Into Product Security, AppSec, DevSecOps, and Cloud Security Without a Degree
1:11:35
1:11:35
Play later
Play later
Lists
Like
Liked
1:11:35🎙️ Coffee, Chaos and ProdSec, Ep 17 Breaking into cybersecurity without a degree feels impossible, yet people do it every single day. So this week, Cameron and Kurt grab their mugs and get real about how career changers actually break into Product Security, Application Security, DevSecOps, and Cloud Security when their background looks nothing like…
…
continue reading
1
280: TechTime Radio: Special Year-End Episode: Eight Tech Stories That Shaped 2025 - We Review 2025’s Biggest Tech Shifts And Ask What Should Change Or Stay The Same For 2026 | Air Date: 12/23 - 12/29 ...
55:49
55:49
Play later
Play later
Lists
Like
Liked
55:49What happens when convenience becomes the cost? We close the year by unpacking the eight tech stories that reshaped daily life, wallets, and trust. From streaming’s pivot back to bundles that feel like cable, to smart speakers and connected appliances that quietly ship household data to the cloud, we trace how “modern” increasingly means managed—an…
…
continue reading
1
Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29🎙️ Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1032: Today's episode will discuss the latest news: La Poste France DDoS Disruption Days Before Christmas Spotify Disables…
…
continue reading
1
Remember Dan Kaminsky and the Newsletter for Dec 16, 2025
1:39:37
1:39:37
Play later
Play later
Lists
Like
Liked
1:39:37Welcome to the Sans program with Jared Rimer. I hope that everyone will enjoy the program this time. This episode will be talking about the newsletter from December 16, 2025. Would you like a link to the newsletter? Why not check out the newsletter for December 16, 2025 and we'll see what it covers. At the top of the newsletter, they paid a tribute…
…
continue reading
1
Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25🎙️ Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1031: Today's episode will discuss the latest news: Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues (#)
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ("Thread Local Storage") and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
…
continue reading
1
Its time for Year End stuff and sans talk for TSB
5:28:47
5:28:47
Play later
Play later
Lists
Like
Liked
5:28:47If you haven't gotten the picture yet, this will be the last TSB program of the year. Feel free to visit the blog to learn more about what's going on and I may even post too. Sans will not be going anywhere, and we'll continue to work on catching that up. Some ADA stuff, end of year predictions and chatter about Sans stuff too. Hope you enjoy!…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs (#)
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn't quite clean for ISC, but SSL2 and SSL…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit…
…
continue reading
1
Independent Living Centers with Sara Schacter-Erenburg, CRC
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07The Center for Independence of the Disabled, New York (CIDNY), founded in 1978, is a Manhattan-based non-profit organization advocating for the civil rights and independence of New Yorkers with disabilities. In 2024, CIDNY served over 40,000 consumers, connecting them to community programs and prodiving peer-support to address the challenges of liv…
…
continue reading
1
Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09🎙️ Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1029: Today's episode will discuss the latest news: · Hackers Exploit Newly Patched Fortinet Auth Bypass Flaws · …
…
continue reading
1
Ep 16 - Part 2 - Get Comfortable Being Vulnerable: When AI, Risk, and Reality Collide in AppSec
1:06:54
1:06:54
Play later
Play later
Lists
Like
Liked
1:06:54🎙️ Coffee, Chaos and ProdSec - Ep 16 Last week we mapped the problem — now we break the system. Kurt and Cameron return with part two of our vulnerability deep dive, tackling CVSS chaos, broken tooling, exploding CVE volume, and how AI is about to overwhelm traditional prioritization models. From exposure validation turning 15,000 findings into 300…
…
continue reading
1
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
…
continue reading
1
279: TechTime Radio: Season 7 Finale, We Weigh Federal AI Rules, Laugh At Luxury “Human Washing Machines,” And Ask Why WAYMO Robotaxis Keep Failing, and our Final Gadget and Gear is "AirFly Pro 2" | Air ...
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44What happens when technology grows faster than the rules meant to guide it? We toast the season finale by tackling that question head-on—starting with a bold move to centralize AI regulation at the federal level and preempt state-by-state rules. We lay out what a single national framework could fix, what it could break, and how lobbying from the bi…
…
continue reading
1
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited; (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited; Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/…
…
continue reading
1
PP091: News Roundup–Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids’ Toys
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s p…
…
continue reading
1
SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30🎙️ SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1028: Today's episode will discuss the latest news: · Pornhub Extorted After Hackers Steal Premium Member Activity Da…
…
continue reading
1
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch;
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
…
continue reading
1
Sans News bites episode 30 for the newsletter that is December 9, 2025
1:38:42
1:38:42
Play later
Play later
Lists
Like
Liked
1:38:42Welcome to sans, episode 30. This will cover the newsletter that was released on December 9, 2025. I hope that people will enjoy the program. This is the link to read the newsletter online. Thanks for reading!
…
continue reading
1
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch; (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch; More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock:…
…
continue reading
1
Sans News Bites episode 29: the newsletter for December 5, 2025
1:26:16
1:26:16
Play later
Play later
Lists
Like
Liked
1:26:16Welcome to program 29 of Sans. The link to the December 5, 2025 newsletter is https://view.email.sans.org/?qs=98500f4c8692dbb312c3051d77038920ed898ed6caa33e4500f4a980442386f2cf208d4038bc473ffe25a888f0f4e9ceafc60e447d83334645b34da0a9bbabbb26d0970656f95232cab5006f8703ffd75d056e09e13503c0">here for you to peruse if you'd like to take a look at it. The…
…
continue reading
1
Former Accenture Employee Charged Over Cybersecurity Fraud, Coupang Data Breach Traced to Ex-Employee Who Retained System Access, Apple Two Zero-Day Flaws Exploited, MITRE Releases 2025 List
17:46
17:46
Play later
Play later
Lists
Like
Liked
17:46🎙️ Ex-Accenture Employee Charged Cybersecurity Fraud, Coupang Breach Ex-Employee, Apple 2 Zero-Days 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1027: Today's episode will discuss the latest news: · Coupang Data Breach Traced to Ex-Employee Who Retained System Acce…
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2…
…
continue reading