Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Security Noise

TrustedSec

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
The Security Perspectives Podcast is a show that explores the world of information security and provides valuable insights into starting and advancing a career in this exciting field. Hosted by Nikolas Behar, each episode features a guest who shares their unique perspective on the latest trends, challenges, and opportunities in information security. From red team operators to chief information security officers, guests offer valuable advice and practical tips for listeners looking to break i ...
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
World in 10

The Times

icon
Unsubscribe
icon
Unsubscribe
Daily
 
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Political Fix

Financial Times

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
  continue reading
 
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
  continue reading
 
Loading …
show series
 
Register for Free, Live webcasts & summits: https://poweredbybhis.coma 00:00 - PreShow Banter™ — Crime is bad 00:18 - dangerous trend of destroying Chromebooks 04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-12 05:40 - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed 06:36 - Story # 1b: https://ransomch.at 09:31 - Story # 2: White H…
  continue reading
 
Our feature guest this week is Jason Haddix, CEO/Hacker @ Arcanum Information Security. We’re also trying something new with our interviews and Jason will be doing an Ask Me Anything in the #AMA channel on Slack. Head on over there to ask him any questions you might have! News from and a lot more!Come join us on the Colorado = Security Slack channe…
  continue reading
 
This week on Unsecurity, Senior Offensive Security Engineer Sean Behan sits with Brad and Megan to dissect Air Gapping. Starting with the development of the Air Gap method, they discuss its evolution and the pros and cons of each type. Tune in for an engaging discussion on understanding systems operations, strengths, and weaknesses of air gapped ne…
  continue reading
 
In a live conversation on May 16, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Quinta Jurecic, and Roger Parloff and Lawfare Legal Fellow James Pearce to discuss legal challenges against President Trump’s executive actions, including the Friday hearing in the Abrego Garcia litigation, the Supreme Court’s …
  continue reading
 
Scattered Spider facilitates UK retail hacks and is moving to the U.S. Defendnot tool can disable Microsoft Defender FBI warns government officials about new waves of deepfakes Huge thanks to our sponsor, Conveyor Are you dealing with security questionnaire chaos this week? If so, get Conveyor’s AI to knock them out for you. Connect Conveyor to any…
  continue reading
 
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk xorsearch.py: Python Functions Didier’s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own c…
  continue reading
 
In this extended edition, former US Secretary of State Antony Blinken sits down with Times Radio for an exclusive broadcast interview – his first outside the United States since leaving office in January. Blinken delves into the US-Europe relationship, the ongoing war in Ukraine, tensions in the Middle East, and offers insights into Joe Biden’s hea…
  continue reading
 
From September 26, 2023: On August 21, the Human Rights Watch released a report detailing systematic abuses of Ethiopian migrants and asylum seekers at the Saudi Arabia-Yemen border. Researchers interviewed dozens of Ethiopian migrants and asylum seekers and found that Saudi border guards had used explosive weapons on them and shot migrants at clos…
  continue reading
 
In this extended Frontline conversation, Lord Ricketts - Peter Ricketts - former UK National Security Advisor and seasoned British diplomat, examines the latest developments in Ukraine's war, from stalled peace talks to Putin's strategic provocations. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, …
  continue reading
 
From January 4, 2022: Government secrecy is pervasive when it comes to national security and foreign affairs, and it’s becoming more and more common for state and even local governments to invoke government secrecy rationales that in the past, only the president of the United States and the national intelligence community were able to claim. While …
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show. Here’s where you can find him: Daily Podcast on SoundCloud | YouTube | Forbes | Twitter/X | Facebook | BlueSky | Mastodon Thanks to our show sponsor, Vanta Do you know the status of your …
  continue reading
 
In this episode, we take an in-depth look at the newly discovered CVE-2025-4664 vulnerability in Google Chrome’s Loader component. This high-severity security flaw is affecting not only Chrome but also other Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi. The issue lies in insufficient policy enforcement within the bro…
  continue reading
 
Send us a text What happens when AI replaces the careers we've built our identities around? This question sits at the heart of my conversation with Naomi Buckwalter, Director of Product Security at Contrast Security and founder of Cybersecurity Gatebreakers Foundation. Naomi's cybersecurity journey began with a moment of clarity during a week-long …
  continue reading
 
Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability datab…
  continue reading
 
In this episode, we dive deep into the recent wave of cyberattacks plaguing major UK retailers such as Marks & Spencer, Co-op, and Harrods, with a special focus on the threat group behind them: Scattered Spider (also known as UNC3944, Muddled Libra, and several other aliases). We'll explore how this loosely coordinated cybercriminal group has expan…
  continue reading
 
Send us a text What happens when we bring our authentic selves to work? Rachel Arnold, Director of Strategic Partnerships at Secure Nation, reveals the power of human connection in building lasting client relationships in cybersecurity. Rachel describes her unique role as "the human API" - connecting people, products, and possibilities through deep…
  continue reading
 
Donald Trump’s decision to lift all US sanctions on Syria and meet with its new President, Ahmed al-Sharaa—a former al-Qaeda commander—has sparked debate. Calling him a "young, attractive, tough guy," Trump’s move could reshape alliances and power dynamics across the Middle East, with significant implications for Israel. Elliott Abrams, a veteran o…
  continue reading
 
It’s been another turbulent week for Labour after Keir Starmer announced a crackdown on legal migration. The prime minister gave what has since become a controversial speech suggesting the UK is at risk of becoming an “island of strangers” – and home secretary Yvette Cooper announced an end to all social care visas, tighter rules for highly skilled…
  continue reading
 
In a major move within the cybersecurity space, Proofpoint has announced the acquisition of Hornetsecurity for over $1 billion. This deal significantly strengthens Proofpoint’s foothold in Microsoft 365 security, while expanding its reach into the small and mid-sized business (SMB) market through Hornetsecurity’s extensive network of managed servic…
  continue reading
 
- CEO of a Cybersecurity Company Charged for Planting Malware. - Microsoft to Expand Hotpatching. - Apple Airplay is Being Exploited. - Ransomware Cripples Hospitals. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informed,…
  continue reading
 
For today’s episode, Lawfare General Counsel and Senior Editor Scott R. Anderson sat down with Contributing Editor Joel Braunold, the Managing Director of the S. Daniel Abraham Center for Middle East Peace, for the latest in their series of podcast conversations delving into the latest developments relating to the Israeli-Palestinian conflict and r…
  continue reading
 
Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom Windows 11 and Red Hat Linux hacked on first day of Pwn2Own The Internet’s biggest-ever black market just shut down amid a Telegram purge Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We …
  continue reading
 
In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
  continue reading
 
In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from “Global Host”, a low-cost virtual hosting provider. https://isc.sans.edu/…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Tyler McBrien, and Daniel Byman to talk through the week’s big national security news, including: “Borderline Behavior.” A major flare-up over the disputed region of Kashmir took place this past week, leading to a major exchange of hostilities between the nuclear powers of India …
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Tyler McBrien, and Daniel Byman to talk through the week’s big national security news, including: “Borderline Behavior.” A major flare-up over the disputed region of Kashmir took place this past week, leading to a major exchange of hostilities between the nuclear powers of India …
  continue reading
 
Vladimir Putin's failure to head to Turkey for peace talks with Volodymyr Zelenskyy appears to have exposed his total lack of desire to end the war in Ukraine. Chatham House's Orysia Lutsevych analyses whether Donald Trump will finally acknowledge that and act accordingly, walk away from the situation entirely, or merely blindly continue his warm r…
  continue reading
 
From the ISACA Middle Tennessee conference March 2025. Darin McCloy is the VP Security and Compliance, CISO at PolicyCo. He is also the Cyber Security, Compliance, and Risk Adviser at Clarity Cyber Assurance, providing Cyber Security and Compliance consultation for clients in a wide range of industry verticals. He helps businesses and government ad…
  continue reading
 
For today's episode, Lawfare Foreign Policy Editor Daniel Byman talked with Evan Braden Montgomery and Toshi Yoshihara, both Senior Fellows at the Center for Strategic and Budgetary Assessments, to discuss their recent Lawfare article, "Beijing's Changing Invasion Calculus: How China Might Put Taiwan in its Crosshairs." Together they discuss how Ch…
  continue reading
 
Users, threat actors, and the system design all influence—and are influenced by—one another. To design safer systems, we first need to understand the players who operate within those systems. Kelly Shortridge and Josiah Dykstra exemplify this human-centered approach in their work. In this episode we talk about: The vital role of human factors in cy…
  continue reading
 
Steel producer disrupted by cyberattack European Vulnerability Database (EUVD) is online CISA pauses advisory overhaul Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in…
  continue reading
 
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show regularly to provide in-depth analysis on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and…
  continue reading
 
What is the link between gender and extremism? What makes it a national security issue? Can domestic violence act as a ‘comorbidity’ for extremism and radicalisation? Should the Australian Government consider following the lead of other countries and classifying misogyny as a form of extremism? In this episode, Elise Stephenson and Pascale Taplin j…
  continue reading
 
Readiness in healthcare compliance means more than checking a box once a year. This episode looks at how healthcare organizations can move beyond annual tasks and create routines that hold up under scrutiny. It’s a practical look at what regulators are expecting and how to be ready before they come knocking. Learn more about Medcurity here: https:/…
  continue reading
 
Q&A225: Are there any things in privacy where you can't ease in or make mistakes? How can a typical person do traffic analysis on phones? How do we address printer privacy concerns? Is it safer to open a port in a VPN than a router? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.co…
  continue reading
 
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches Another day, another phishing campaign abusing google.com open redirects Google’s links from it’s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/di…
  continue reading
 
In this episode, we dive into the active exploitation of two critical zero-day vulnerabilities in SAP NetWeaver—CVE-2025-31324 and CVE-2025-42999. Threat actors have been leveraging these flaws since January 2025 to gain unauthenticated access, upload malicious web shells, and ultimately achieve remote code execution by chaining an insecure deseria…
  continue reading
 
On this episode of SecurityDNA, Steve Lasky invites International SOS Senior Security Advisor Rich Davis to the discussion table. Davis brings his extensive background in aviation security to the podium today to discuss the long-awaited REAL ID implementation and how it will impact airport security, operations, and the traveler experience. Rich Dav…
  continue reading
 
The recent ransomware attack on Marks & Spencer (M&S) is a sobering example of the evolving cyber threat landscape confronting the retail industry. In this episode, we unpack how one of the UK's most iconic retailers fell victim to a sophisticated cybercriminal group known as Scattered Spider. This group, recognized for its advanced social engineer…
  continue reading
 
With China building warships at a rate well beyond anyone else on the planet, Donald Trump has vowed to “make US shipbuilding great again.” The World in 10 analyses what threat the US president sees from a Chinese mega-fleet, and whether his executive order, “Restoring America’s Maritime Dominance”, is too late to prevent it. The World in 10 is the…
  continue reading
 
In this episode, we break down Apple’s massive May 2025 security update blitz—a sweeping patch release that spanned iOS, macOS, iPadOS, tvOS, visionOS, and watchOS. The urgency? Two zero-day vulnerabilities, CVE-2025-31200 (Core Audio) and CVE-2025-31201 (Core Media), were already under active exploitation in what experts are calling “extremely sop…
  continue reading
 
Loading …
Listen to this show while you explore
Play