Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
…
continue reading
Network With Cisco Podcasts
Go beyond the network with Cisco IT. Discover the innovation, thought leadership and everyday life of those in Cisco’s enterprise IT organization. Join us as we explore the world of technology, one story at a time.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
The Cisco Podcast Network is a collective of podcasts from across Cisco spanning technology to culture and everything in between. Hear from Cisco customers, partners, and Cisco insiders on the topics that matter most to you. Email us with your feedback and suggestions. Discover your favorite playlists today!
…
continue reading
Tastier than a bucket of kittens
…
continue reading
Network Automation Nerds is for network engineers and infrastructure professionals eager to learn more about automation. Join host Eric Chou as he explores how to take advantage of modern network programmability to automate tasks, build robust systems, and get more done in less time. You’ll hear from a lineup of seasoned engineers, avid learners, industry leaders, and tool creators as they share tips, best practices, and hard-won advice.
…
continue reading
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
…
continue reading
Yuval Boger, Chief Commercial Officer at QuEra, hosts thought leaders in quantum computing, quantum sensing, and quantum communications to discuss business and technical aspects that impact the quantum ecosystem. Full transcripts are available at podcast.yboger.com
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Podcast by Cisco
…
continue reading
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
…
continue reading
The Network+ Audio Course is your comprehensive audio training series for mastering the CompTIA Network+ certification. Designed for learners on the go, this Audio Course transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
…
continue reading
The Art of Network Engineering blends technical insight with real-world stories from engineers, innovators, and IT pros. From data centers on cruise ships to rockets in space, we explore the people, tools, and trends shaping the future of networking, while keeping it authentic, practical, and human. We tell the human stories behind network engineering so every engineer feels seen, supported, and inspired to grow in a rapidly changing industry. For more information, check out https://linktr.e ...
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Listen in on discussions with Cisco and industry experts regarding business, design, and deployment considerations of SSL VPN in focused 10-15 minute topics. This will be a series of seven discussions, occurring once monthly.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
How does technology influence our lives, work and relationships? Join Cisco co-hosts Collette and Rosie as they embrace a balanced life in the tech world and interview inspiring guests. Disclaimer: We like things explained simple. We’ll take the tech acronyms out and put the fun in.
…
continue reading
Where its all about Helping You Grow Your Network Marketing Business by Learning from the Top Income Earners in The Industry.
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Echoes from the Past: The Radio Shows that Defined an Era takes you on a journey through the golden age of radio, revisiting the iconic shows that shaped entertainment history. From thrilling mysteries to heartfelt comedies, we explore the voices, stories, and personalities that captured the hearts of millions. Tune in each week to relive the magic of classic radio and discover how these timeless broadcasts continue to influence modern media.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
In a world where security breaches are not a matter of "if" but "when," "Command & Control: An IT Security Podcast" stands as a bastion of knowledge and expertise. Hosted by Aaron Banner, a distinguished retired Army Colonel and cyber security expert, this podcast is designed to equip businesses with the tools and knowledge they need to maintain a fortress of digital security. Aaron Banner brings to the table years of experience having protected national security at the highest levels, to br ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Inside Outside Innovation
Brian Ardinger, Founder of Inside Outside Innovation podcast, InsideOutside.io, and the Inside Outside Innovation Summit
Inside Outside Innovation explores the ins and outs of innovation with raw stories, real insights, and tactical advice from the best and brightest in startups & corporate innovation. Each week we bring you the latest thinking on talent, technology, and the future of innovation. Join our community of movers, shakers, makers, founders, builders, and creators to help speed up your knowledge, skills, and network. Previous guests include thought leaders such as Brad Feld, Arlan Hamilton, Jason Ca ...
…
continue reading
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
…
continue reading
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
…
continue reading
*Where big questions meet bold ideas* Agents of Tech is a video podcast exploring the biggest questions of our time—featuring bold thinkers and transformative ideas driving change. Perfect for the curious, the thoughtful and anyone invested in what’s next for our planet. Hosted by Stephen Horn, former BBC producer turned entrepreneur and CEO, Autria Godfrey, Emmy Award-winning journalist and Laila Rizvi, neuroscience and tech researcher, the show features conversations with trailblazers resh ...
…
continue reading
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
Welcome to the Broadband Bunch, a podcast about broadband and how it impacts all of us. Join us to learn about the state of the industry and the latest innovations and trends. Connect with the thought leaders, pioneers and policymakers helping to shape your future through broadband. The Broadband Bunch is sponsored by: ETI Software: www.etisoftware.com VETRO: www.vetrofibermap.com
…
continue reading
Gamma Electronics presents DAS Talk, hosted by Peter Weyherter and Philip Nicholas aims to increase competency and awareness among integrators, AHJs, builders, and stakeholders involved in ERCES. We strive to inspire more organizations in this field through a blend of technical depth and accessible conversation, positioning our podcast as a go-to resource for professionals and individuals at the intersection of technology, safety, and communication
…
continue reading
XenTegra podcasts are about VMware, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via VMware Workspace ONE. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
Frank Proctor selects, and then describes some of the greatest shows from the golden age of radio — the 1930s and 1940s — like The Shadow and Fibber McGee & Molly. A half-hour of drama, mystery or suspense is followed by a half-hour of comedy.
…
continue reading
1
Inside Outside
Brian Ardinger, Founder of NXXT, Inside Outside Innovation podcast, InsideOutside.io, and the Inside Outside Innovation Summit
Inside Outside Innovation explores the ins and outs of innovation with raw stories, real insights, and tactical advice from the best and brightest in startups & corporate innovation. Each week we bring you the latest thinking on talent, technology, and the future of innovation. Join our community of movers, shakers, makers, founders, builders, and creators to help speed up your knowledge, skills, and network. Previous guests include thought leaders such as Brad Feld, Arlan Hamilton, Jason Ca ...
…
continue reading
Home of the Cloud Unfiltered Podcast cloudunfiltered.substack.com
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
1
404 Script Not Found: Interview Tips with Sammy
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56Golden minds and golden interview tips this week, as Ian and Kat are joined by Cisco's US Public Sector Sales Director Sammy Brenner for all her best interview tips (after we get through talking supplements and subscriptions...bear with us)!Sammy shares her career journey (starting at 5:10 in) before we segue into into interview icks, tips and best…
…
continue reading
1
Securing the Future with Cisco: AI, Quantum, and the Evolution of Networking
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44In this episode of Command and Control, host Jason Pope sits down with Kinney Yee and LeeAnn Larson to explore how Cisco is redefining secure networking with innovation, intelligence, and integration. From AI Canvas and SecureX to post-quantum cryptography, the discussion highlights how Cisco’s ecosystem—backed by XenTegra’s expertise—delivers a sm…
…
continue reading
1
Chainguard’s $3.5 Billion Valuation Signals Massive Investor Confidence in Secure-by-Default Software
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32Chainguard, the Kirkland, Washington-based cybersecurity company, has announced a landmark $280 million growth funding round led by General Catalyst’s Customer Value Fund (CVF), pushing its total capital raised to nearly $900 million and valuing the firm at $3.5 billion. This new round marks a pivotal phase for Chainguard as it shifts from product-…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
$1 Million WhatsApp Exploit Withdrawn—Researcher Silent, Meta Calls It “Low-Risk”
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
…
continue reading
1
Explaining the AWS Outage & Other Recent Incidents
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05During complex infrastructure outages, an initial issue can often have a ripple effect, creating a web of problems to resolve. Explore how this phenomenon appeared to play out during the October 20 AWS outage and also unpack other recent outage events.———CHAPTERS00:00 Intro00:58 AWS Outage05:24 Microsoft Azure Front Door Outage08:00 Microsoft-AT&T …
…
continue reading
1
Explaining the AWS Outage & Other Recent Incidents
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05During complex infrastructure outages, an initial issue can often have a ripple effect, creating a web of problems to resolve. Explore how this phenomenon appeared to play out during the October 20 AWS outage and also unpack other recent outage events. ——— CHAPTERS 00:00 Intro 00:58 AWS Outage 05:24 Microsoft Azure Front Door Outage 08:00 Microsoft…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
continue reading
1
OpenAI Atlas Omnibox Jailbreak Exposes New AI Security Flaw
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
Microsoft Rushes Emergency Fix for WSUS Remote Code Execution Flaw (CVE-2025-59287)
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
…
continue reading
1
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
…
continue reading
1
Perplexity Comet AI Browser Launch Exploited in Coordinated Impersonation Scam
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37The launch of Perplexity’s Comet AI browser — a major step forward in AI-assisted browsing — was almost immediately hijacked by cybercriminals. Within weeks of its July debut, threat intelligence firm BforeAI uncovered a coordinated impersonation campaign designed to exploit public interest in the new product. The campaign involved a web of fraudul…
…
continue reading
1
Bill Wisotsky, Principal Quantum Systems Architect at SAS
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19Bill joins Yuval Boger to discuss SAS’s vendor-agnostic, hybrid approach to quantum and analytics. Highlights include D-Wave warm-starts that let SAS prove optimal kidney-exchange solutions in seconds, as well as QML pilots for fraud and bankruptcy modeling and disaster response. He shares a pragmatic definition of “quantum advantage”, treating QPU…
…
continue reading
1
Lazarus Group Targets European UAV Firms in North Korea’s Drone Espionage Push
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23A new wave of cyber-espionage attacks reveals North Korea’s deepening effort to steal critical defense technologies from Europe. In a sophisticated campaign dubbed Operation Dream Job, the Lazarus Group — also known as Diamond Sleet and Hidden Cobra — has launched targeted attacks on European defense contractors and UAV (unmanned aerial vehicle) de…
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Dave Lewis, Mike Poole, Conor Mulherin - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Microsoft WSUS vulnerability, LastPass death hoax, Copilot phishing technique
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36Microsoft WSUS vulnerability could allow for remote code execution Fake LastPass death claims used to breach password vaults New CoPhish attack steals OAuth tokens via Copilot Studio agents Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals, an…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
continue reading
1
A look behind the lens. [Research Saturday]
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
continue reading
1
Toys “R” Us Canada Confirms Customer Data Breach After Dark Web Leak
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and…
…
continue reading
1
Week in Review: AI powered cyberattacks, Chinese time hacked, the 72 hour workweek
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests David Cross, CISO, Atlassian, and davidcrosstravels.com, and Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everyth…
…
continue reading
1
Kyocera’s Motex Lanscope Hit by Active Attacks: Critical 9.8 Exploit Enables Remote Code Execution
18:05
18:05
Play later
Play later
Lists
Like
Liked
18:05A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code sim…
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-523
…
continue reading
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
…
continue reading
1
BIND 9 Emergency Patches: ISC Fixes High-Severity Cache Poisoning and DoS Flaws
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilit…
…
continue reading
1
Adobe Confirms Active Exploitation of SessionReaper Vulnerability in Commerce Platforms
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing em…
…
continue reading
1
TNO047: Advice From Both Sides of the Network Aisle
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »…
…
continue reading
1
AI Sidebar Spoofing: How Malicious Extensions Hijack ChatGPT and Perplexity Interfaces
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like Ch…
…
continue reading
1
Jingle Thief exploit, Lazarus targets jobseekers, the 72 hour workweek
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Jingle Thief hackers steal millions in gift cards by exploiting cloud infrastructure Lazarus hackers targeted European defense companies Deep Tech work culture pushes for 72 hour workweeks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. T…
…
continue reading
1
Jewett-Cameron Reports Ransomware Breach Involving Encryption and Data Theft
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryptio…
…
continue reading
1
Star Blizzard’s Malware Makeover: From LostKeys to MaybeRobot
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned th…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data sc…
…
continue reading