This is Proof Point podcast where we decode digital success, one click at a time. We share key takeaways fueled by data and insights that your team can implement today to drive growth.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
A cybersecurity podcast powered by Proofpoint
…
continue reading
Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
Outbound is a weekly podcast illuminating the stories of sales professionals that have taken the path less traveled to build strong relationships that have led to soaring new heights and beautiful vistas. These are the stories of building relationships in sales that have led to great business outcomes.
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Master B2B marketing by learning the MINDSETS, SKILLSETS and TOOLSETS that drive revenue-generating RESULTS. Each week, we discuss revenue-generating success stories with Masters of B2B Marketing and share insightful strategy, tangible tactics and actionable advice, utilizing the MSTR Framework to help you accelerate growth. Our goal is to be the podcast top B2B marketers listen to regularly for actionable insights. We want our audience to learn from the Master Marketers that have developed ...
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
We love great marketing. Marketing meets your people in their problem, and guides them to a successful version of themselves. But B2B marketing is broken Fire Drill Forecasting, MQL Chasing Cyber Stalking Future Buyers Martech vendors and VCs have us focused on growth at ANY cost But only 5% of buyers are in a buying cycle. And it's a blood bath of competition. There's a war coming. And you're about to meet the Rebel Alliance. Welcome to Demand Wars. Where the best B2B marketers in the world ...
…
continue reading

1
Cox and Charter Merger, Proofpoint's $1B Acquisition, and the Rise of Shadow AI in Education
12:38
12:38
Play later
Play later
Lists
Like
Liked
12:38Charter Communications has announced its acquisition of Cox Communications for $34.5 billion, a significant move that will merge two of the largest internet service providers in the United States. This merger is expected to require approval from the Federal Communications Commission due to Cox's critical operational licenses. The combined entity pl…
…
continue reading

1
Proofpoint Acquires Hornetsecurity for $1B: A New Era in Microsoft 365 Security
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18In a major move within the cybersecurity space, Proofpoint has announced the acquisition of Hornetsecurity for over $1 billion. This deal significantly strengthens Proofpoint’s foothold in Microsoft 365 security, while expanding its reach into the small and mid-sized business (SMB) market through Hornetsecurity’s extensive network of managed servic…
…
continue reading

1
Square Enix Drops Missing-Link, M&S Cyber Attack Triggers Security Overhaul, Proofpoint Acquires Hornetsecurity, YouTube Introduces AI Ads, and more...
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43(0:10): Square Enix Cancels Missing-Link, Focuses on Kingdom Hearts IV with New Gameplay and Disney Collaborations (2:17): M&S Cyber Attack Sparks Urgent Retail Security Overhaul Amid Rising Threats from Scattered Spider (4:32): Proofpoint Acquires Hornetsecurity for $1B to Boost MSP Capabilities Amid Cybersecurity Boom (6:42): YouTube Unveils AI-P…
…
continue reading

1
CISA Flags Chrome Vulnerability CVE-2025-4664: Patch Before June 5th
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44In this episode, we break down the recently discovered and actively exploited Chrome vulnerability CVE-2025-4664—a high-severity flaw stemming from insufficient policy enforcement in Chrome’s Loader component. This vulnerability allows attackers to leak cross-origin data, including sensitive query parameters and session information, via crafted HTM…
…
continue reading

1
483,000 Patients at Risk: Catholic Health Vendor Breach Exposes Critical Data
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35In this episode, we dive deep into a newly disclosed healthcare data breach affecting over 483,000 patients of Catholic Health, stemming from a misconfigured Elasticsearch database maintained by third-party vendor Serviceaide. From September 19 to November 5, 2024, the database was inadvertently exposed to the public internet, putting highly sensit…
…
continue reading

1
Google Transforms Smartphones into Desktops, TSMC Raises Wafer Prices, India Advances to 6G Technology, TSMC Expands with New Fabs, and more...
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43(0:10): Google's 'Android Desktop Mode' to Transform Smartphones into PC-like Workstations by 2025 (2:21): TSMC's 10% Wafer Price Hike to Impact Apple and Samsung, Triggering Higher Costs for Future Devices (4:10): India's Ambitious Leap to 6G: Terahertz Tech Promises 100x Faster Speeds (5:39): TSMC Expands with 8 New Fabs; Samsung Tests 2nm Proces…
…
continue reading

1
Navigating DMARC Complexity: Insights from EasyDMARC's CEO on Email Security for SMBs with Gerasim Hovhannisyan
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39Gerasim Hovhannisyan, CEO of EasyDMARC, discusses the complexities and challenges of implementing DMARC (Domain-based Message Authentication, Reporting & Conformance) in the cybersecurity landscape. He shares his personal journey, which began after experiencing a significant financial loss due to an email phishing attack. This incident prompted him…
…
continue reading

1
Protecting Data and Models: Cybersecurity Insights and Pricing Strategies for AI Solutions with James D. Wilton and Bryant Tow
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54The discussion centers around the intersection of artificial intelligence (AI), cybersecurity, and monetization strategies, emphasizing the dual challenges of protecting data and AI models while also effectively pricing these solutions. Experts Bryant Tow and James D. Wilton explore the urgent risks posed by AI, including threats to company data an…
…
continue reading

1
Chrome's New Vulnerability CVE-2025-4664: A Security Flaw That Can Lead to Account Takeover
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19In this episode, we take an in-depth look at the newly discovered CVE-2025-4664 vulnerability in Google Chrome’s Loader component. This high-severity security flaw is affecting not only Chrome but also other Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi. The issue lies in insufficient policy enforcement within the bro…
…
continue reading

1
Scattered Spider Targets UK and US Retailers: The Growing Threat to Major Brands
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52In this episode, we dive deep into the recent wave of cyberattacks plaguing major UK retailers such as Marks & Spencer, Co-op, and Harrods, with a special focus on the threat group behind them: Scattered Spider (also known as UNC3944, Muddled Libra, and several other aliases). We'll explore how this loosely coordinated cybercriminal group has expan…
…
continue reading

1
AI in Action: Radiologists Thrive, Data Silos Persist, and LastPass Expands SaaS Monitoring
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09Data silos are significantly hindering AI innovation, as highlighted by a recent report from Infanti. The survey of over 1,200 IT and cybersecurity professionals revealed that more than half of the respondents experience isolated data within their organizations, leading to inefficiencies and slow security responses. Nearly 30% of IT professionals r…
…
continue reading

1
Microsoft Issues Urgent Security Patch, Apple Unveils Matrix3D AI, BOE Launches Green Tech Innovations, MediaTek Launches Dimensity 9400e, and more...
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54(0:10): Microsoft Urgently Patches Zero-Day Vulnerabilities Amid Active Attacks; Users Urged to Update Immediately (2:18): Apple Unveils Matrix3D: AI Revolutionizes 3D Modeling from Minimal Images (4:17): BOE Unveils 30+ Innovations at Display Week 2025, Launches ONE Brand for Green Tech Revolution (6:31): MediaTek Unveils Dimensity 9400e: Powering…
…
continue reading

1
Europe's Vulnerability Database Launches as U.S. Cybersecurity Falters; AI Adoption Trends Revealed
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51The European Vulnerability Database (EUVD) has officially launched, providing a vital platform for monitoring critical security flaws amid challenges faced by the U.S. in cybersecurity funding and management. This initiative aims to enhance transparency and deliver essential information on vulnerabilities, addressing gaps left by the U.S. Common Vu…
…
continue reading

1
Exploited in the Wild: SAP NetWeaver Zero-Days Hit Fortune 500
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55In this episode, we dive into the active exploitation of two critical zero-day vulnerabilities in SAP NetWeaver—CVE-2025-31324 and CVE-2025-42999. Threat actors have been leveraging these flaws since January 2025 to gain unauthenticated access, upload malicious web shells, and ultimately achieve remote code execution by chaining an insecure deseria…
…
continue reading

1
The ClickFix Convergence: How Threat Actors Blur the Lines
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naaman, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines. At the center of the conversation is ClickFix—a fast-evolving social engineering technique o…
…
continue reading

1
Checkout Chaos: Inside the £3.5 Million-a-Day M&S Cyber-Shutdown
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19The recent ransomware attack on Marks & Spencer (M&S) is a sobering example of the evolving cyber threat landscape confronting the retail industry. In this episode, we unpack how one of the UK's most iconic retailers fell victim to a sophisticated cybercriminal group known as Scattered Spider. This group, recognized for its advanced social engineer…
…
continue reading

1
Targeted iOS Attacks: The Zero-Days Apple Had to Patch Fast
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09In this episode, we break down Apple’s massive May 2025 security update blitz—a sweeping patch release that spanned iOS, macOS, iPadOS, tvOS, visionOS, and watchOS. The urgency? Two zero-day vulnerabilities, CVE-2025-31200 (Core Audio) and CVE-2025-31201 (Core Media), were already under active exploitation in what experts are calling “extremely sop…
…
continue reading

1
UK Government Faces Copyright Pressure, Spotify Launches AI DJ Features, House GOP Advocates for AI Regulation, India Designs First 3nm Chips, and more...
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04(0:10): UK Government Pressured to Update Copyright Laws for AI Protection Amidst Music Industry Backlash (2:21): Spotify Unveils AI DJ Voice Commands for Personalized Music Experience (4:12): House GOP Pushes AI Regulation Bill, Sparks Debate Over Consumer Protections and Big Tech Influence (6:28): India to Design Its First 3nm Semiconductor Chips…
…
continue reading

1
Culture as a Strategy: Leadership Lessons from a Thriving CPA Firm
47:46
47:46
Play later
Play later
Lists
Like
Liked
47:46Benjamin (BJ) Lippert is a Managing Partner at Donovan CPAs, a full-service accounting firm dedicated to small businesses and their owners. Since joining the firm in 2015, he has been instrumental in revamping the firm’s assurance practice, fostering a culture of accountability and growth. His leadership emphasizes structure, consistency, and a peo…
…
continue reading

1
Rise in Remote Work Drives New Ventures; Insurers Address AI Risks as CISA Alters Info Sharing
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Remote work is driving a significant startup boom, reshaping the IT services market. A recent study indicates that companies with higher levels of remote work during the COVID-19 pandemic have seen a notable increase in employee startups, with an estimated 11.6% of new business formations attributed to this trend. Despite major corporations reinsta…
…
continue reading

1
Texas vs Google: The $1.4 Billion Wake-Up Call for Data Privacy Violations
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35In this episode, we unpack the groundbreaking $1.4 billion privacy settlement between Google and the state of Texas—now the largest of its kind in U.S. history. This isn't just about numbers; it's about how data privacy enforcement is shifting dramatically at the state level in the absence of federal legislation. We dive deep into the Texas Capture…
…
continue reading

1
Marbled Dust's Zero-Day Exploit: Unveiling a Türkiye-linked Espionage Campaign Against Kurdish Forces
9:40
9:40
Play later
Play later
Lists
Like
Liked
9:40In April 2024, a sophisticated cyber espionage campaign orchestrated by the Türkiye-linked hacker group, Marbled Dust, began exploiting a previously unknown zero-day vulnerability in the Output Messenger platform—a self-hosted enterprise chat application. This vulnerability (CVE-2025-27920) resides in the Output Messenger Server Manager and allows …
…
continue reading

1
TeleMessage Exploit: Inside the Messaging Flaw That Hit Coinbase and CBP
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14In this episode, we dissect CVE-2025-47729, a critical vulnerability in TeleMessage, a message archiving app recently thrust into the spotlight due to its use by former National Security Advisor Mike Waltz. Following Waltz’s controversial tenure—marked by the "Signalgate" leak and the subsequent appearance of TeleMessage on his phone—researchers un…
…
continue reading

1
Saudi Arabia Launches AI Company, Google Launches AI Futures Fund, Fortnite Prepares for iOS Return, NHTSA Probes Tesla Self-Driving Tech, and more...
11:11
11:11
Play later
Play later
Lists
Like
Liked
11:11(0:10): Saudi Arabia Launches AI Company Humain to Rival US and China, Targets Global AI Leadership (2:10): Google Launches AI Futures Fund: A Boost for Startups or Strategic Ecosystem Expansion? (4:12): Fortnite Poised for iOS Comeback Amidst Epic Games and Apple Antitrust Battle (6:19): NHTSA Probes Tesla's Self-Driving Tech Amid Stock Surge and …
…
continue reading

1
U.S.-China Tariff Agreement Fuels Market Growth; AI Layoffs and AEO Shift Digital Marketing Focus
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22The recent U.S.-China tariff truce has led to a significant surge in global markets, with the U.S. reducing tariffs on Chinese goods from 145% to 30% and China lowering its tariffs on American imports from 125% to 10%. While this agreement has provided short-term relief, it has also triggered caution among Chief Information Officers (CIOs), who are…
…
continue reading

1
Backdoored by ‘Cheap’ AI: How Fake npm Packages Compromised Cursor IDE
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18A new supply chain attack has emerged—this time targeting macOS users of the Cursor AI code editor through rogue npm packages. In this episode, we break down how threat actors published malicious modules—sw-cur, sw-cur1, and aiide-cur—promising cheap access to Cursor's AI features. Once installed, these packages function as backdoors, stealing cred…
…
continue reading

1
Amazon Unveils New Warehouse Robots, Apple Moves iPhone Production to India, Autonomous Vehicles Expand Global Reach, Samsung Galaxy S25 Edge Debuts, and more...
11:49
11:49
Play later
Play later
Lists
Like
Liked
11:49(0:10): Amazon Unveils 'Vulcan' Robots to Boost Warehouse Efficiency, Emphasizes Human Collaboration and Retraining (2:25): Apple Shifts iPhone Production to India: Tata and Foxconn Lead Expansion (4:21): Autonomous Vehicle Revolution: Uber, Pony.ai, and WeRide Expand Global Reach with Advanced Tech Partnerships (6:59): Samsung Galaxy S25 Edge to D…
…
continue reading

1
160,000 Victims Later: The Aspire USA Breach Under Valsoft’s Watch
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23In this episode, we break down the February 2025 data breach that hit Valsoft Corporation, operating under the name AllTrust, through its subsidiary Aspire USA. Over 160,000 individuals are potentially impacted, with exposed data including Social Security numbers, driver’s license information, and financial account details. We explore how the breac…
…
continue reading

1
rand-user-agent: The NPM Package That Opened a Backdoor
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04In this episode, we break down the recent compromise of the rand-user-agent NPM package—an attack that quietly turned a once-trusted JavaScript library into a delivery mechanism for a Remote Access Trojan (RAT). The attacker exploited the package’s deprecated but still-popular status, publishing malicious versions that never appeared in the GitHub …
…
continue reading

1
Mastering Vendor Management: Lessons from IT Transformation and M&A Success Stories with Mousa Hamad
18:43
18:43
Play later
Play later
Lists
Like
Liked
18:43Mousa Hamad, an expert in procurement and vendor management, shares insights from his extensive career in IT operations and business transformation. He emphasizes the importance of being customer-oriented and empathetic, drawing from his experiences on the front lines of IT. Hamad recounts a significant project where he tackled SaaS cost management…
…
continue reading

1
How AI is Transforming MSP Marketing: Strategies for Success in the Age of ChatGPT with Srinivas Krishnaswamy
52:31
52:31
Play later
Play later
Lists
Like
Liked
52:31Srinivas Krishnaswamy, author of "Inbound Marketing in the Age of GPTs," discusses the transformative impact of AI on customer search behaviors and marketing strategies for Managed Service Providers (MSPs). He emphasizes that traditional methods, particularly reliance on Google for information discovery, are evolving. With the rise of generative AI…
…
continue reading

1
Ransomware Attacks Rise 37% in 2025; Microsoft’s New Passwordless Strategy and Security Insights
17:28
17:28
Play later
Play later
Lists
Like
Liked
17:28Ransomware attacks have surged dramatically, particularly affecting small and mid-sized businesses (SMBs), which now experience ransomware in 88% of breaches. According to Verizon's 2025 data breach investigations report, ransomware was detected in 44% of over 12,000 data breaches, marking a 37% increase from the previous year. While the number of …
…
continue reading

1
Apple Launches iOS 18.5 Update, Microsoft Activision Merger Approved, Samsung Introduces LEDoS Smart Glasses, Imagination Technologies Launches E-Series GPUs, and more...
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38(0:10): Apple's iOS 18.5 and iPadOS 18.5 Bring Battery Boosts, Pride Themes, and Expanded Satellite Messaging (2:09): Court Clears Microsoft-Activision Merger, Rejects FTC's Appeal Against $69 Billion Deal (4:00): Samsung to Revolutionize AR Market with LEDoS-Powered Smart Glasses by 2027 (6:17): Imagination Technologies Unveils E-Series GPUs: A Ga…
…
continue reading

1
MSPs Achieve 19% Profit Margins; Google’s AI Search Rollout; Arctic Wolf’s $3M Security Warranty
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06Top-performing IT solution providers are experiencing record profitability, achieving over 19% adjusted profit margins for the fifth consecutive year, despite a slowdown in revenue growth. The latest report from Service Leadership indicates that while managed service providers (MSPs) saw revenue growth of only 7.1% in 2024, their adjusted earnings …
…
continue reading

1
PipeMagic, Procdump, and Privilege Escalation: Tracking the Windows CLFS Exploit Chain
19:21
19:21
Play later
Play later
Lists
Like
Liked
19:21A zero-day vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824, became the center of a global cybersecurity storm when it was exploited in the wild before Microsoft patched it on April 8, 2025. In this episode, we take a deep dive into how this elevation of privilege exploit allowed attackers to gain SYSTEM-level a…
…
continue reading

1
Pegasus Spyware, WhatsApp v. NSO Group, and the Global Battle for Data Privacy
21:26
21:26
Play later
Play later
Lists
Like
Liked
21:26In this episode, we dive deep into the legal, technical, and geopolitical implications of the U.S. court ruling in WhatsApp v. NSO Group—a landmark case in the global effort to hold spyware developers accountable. The conversation unpacks the court’s decision to award over $167 million in damages to WhatsApp for the unauthorized deployment of Pegas…
…
continue reading

1
How CodeAnt AI is Automating Code Reviews for 50+ Dev Teams
17:37
17:37
Play later
Play later
Lists
Like
Liked
17:37AI tools are generating more code than ever — but who’s reviewing it? In this episode, we spotlight CodeAnt AI, the fast-growing platform built to solve the growing code review bottleneck created by AI-assisted development. You’ll learn how CodeAnt AI: Cuts review time and post-deployment bugs by over 50% Uses a proprietary language-agnostic AST en…
…
continue reading

1
Apple's AI Ambitions Shake Google, Netflix Launches AI-Powered Update, Amazon Launches Touch-Sensitive Robot, Apple Unveils iOS 18.5 Features, and more...
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41(0:10): Apple's AI Ambitions Shake Google, Triggering $150 Billion Market Value Drop (2:22): Netflix Unveils New AI-Powered TV Homepage and Mobile Vertical Feed Amid Streaming Wars (4:34): Amazon Unveils Vulcan: Touch-Sensitive Robot Aims for Global Warehouse Efficiency (6:48): Apple Unveils iOS 18.5: Enhanced Performance, Parental Controls, and Ex…
…
continue reading

1
Data Leaks from AI Tools, OpenAI's Nonprofit Control, and Duolingo's AI Transition: A Governance Crisis
14:47
14:47
Play later
Play later
Lists
Like
Liked
14:47AI tools are increasingly leaking sensitive data, with a recent report revealing that 68% of organizations have experienced data leaks due to employees using artificial intelligence tools. Despite a high level of confidence among security leaders—90% believe their security measures are effective—more than half reported regular malware and phishing …
…
continue reading

1
The Langflow Breach: How a Popular AI Tool Opened the Door to Hackers
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22A newly disclosed zero-day vulnerability, CVE-2025-3248, is being actively exploited in the wild—and it's targeting Langflow, a popular open-source framework for building AI-powered applications. In this episode, we unpack how a missing authentication check in the /api/v1/validate/code endpoint allowed remote attackers to run arbitrary code on unpa…
…
continue reading

1
Mirai Reloaded: Why CVE-2024-7399 Still Haunts Samsung Servers
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26In this episode, we break down the active exploitation of CVE-2024-7399, a critical path traversal and arbitrary file upload vulnerability in Samsung MagicINFO 9 Server. Despite a patch released in August 2024 (version 21.1050 and later), many systems remain exposed — and threat actors are taking full advantage. We explore how attackers are exploit…
…
continue reading

1
CVE-2025-31324: A Critical SAP Zero-Day in Active Exploitation
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13A critical zero-day vulnerability — CVE-2025-31324 — is shaking the enterprise tech world. In this episode, we dive deep into the alarming exploit targeting SAP NetWeaver Java systems, specifically the Visual Composer component, now under active attack. This vulnerability enables unauthorized file uploads, which attackers are using to deploy webshe…
…
continue reading

1
Oura Launches AI Glucose Tracking, Apple Arcade Expands with New Games, Quantum Computing Race Intensifies, Lightricks Unveils AI Video Model, and more...
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15(0:10): Oura Unveils AI-Driven Glucose Tracking Features, Strengthens Health Monitoring Platform (2:01): Apple Arcade Expands: New Games, Shaq in NBA 2K25, and Vision Pro Exclusives (3:50): Quantum Computing Race Heats Up: Startups and Giants Push Boundaries with Multi-Million Investments (6:01): Lightricks Unveils LTXV-13B: AI Model Revolutionizes…
…
continue reading

1
U.S. Economy Adds Jobs, Yet IT Sector Shrinks; Tariffs Challenge Tech Giants' Financial Outlook
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25The U.S. job market shows resilience with the addition of 177,000 payrolls in April, despite a slight decline in IT roles as tech professionals exit the field. The unemployment rate remains low at 4.2 percent, but the IT sector has seen significant job losses, with over 10,600 positions cut in April alone. This trend is attributed to a cautious hir…
…
continue reading

1
Another Day, Another Commvault Zero-Day: RCE, Path Traversal, and KEV Inclusions
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00In this episode, we break down the anatomy of some of the most critical vulnerabilities threatening enterprise systems in 2025 — and the real-world attacks already exploiting them. We explore how seemingly small issues like path traversal can escalate into full remote code execution (RCE), and how threat actors are chaining vulnerabilities to bypas…
…
continue reading

1
Kelly Benefits Breach: What 413,000 Exposed Records Teach Us About Cybersecurity
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31In this episode, we dive deep into the massive data breach at Kelly Benefits, a payroll and benefits administrator that exposed the sensitive personal data of over 413,000 individuals. We break down what happened, what data was compromised, and how the breach escalated from 32,000 initially impacted people to hundreds of thousands across the countr…
…
continue reading

1
$491M Budget Cut: The White House Move That Could Reshape CISA
18:57
18:57
Play later
Play later
Lists
Like
Liked
18:57In this episode, we unpack the rising tensions surrounding the Cybersecurity and Infrastructure Security Agency (CISA) as it faces proposed budget cuts, looming layoffs, and growing criticism over alleged mission overreach. While CISA continues to champion its role in defending national infrastructure and guiding cyber resilience, reports of domest…
…
continue reading

1
Tech Giants Face Antitrust Blitz, Uber and WeRide Launch Robotaxis, CEOs Push for AI Education, Meta Launches LLaMA 4 AI, and more...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44(0:10): Global Legal Blitz Targets Tech Giants: Google, Apple, Meta Face Major Antitrust Fines and Lawsuits (2:46): Uber and WeRide to Launch Robotaxis in 15 Cities, Revolutionizing Urban Transportation (4:41): 250 CEOs Urge Mandatory AI Education in Schools to Boost U.S. Competitiveness and Close Skill Gaps (7:05): Meta Unveils LLaMA 4: A Leap For…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike.
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
Reimagining GTIA: From Bureaucracy to a Dynamic Hub for Technology Business and Collaboration
17:46
17:46
Play later
Play later
Lists
Like
Liked
17:46The Global Technology Industry Association (GTIA) stands at a pivotal moment, facing a profound transformation following the sale of its certification and training division. This transition presents a unique opportunity for GTIA to redefine its mission and solidify its role as a cornerstone of the IT industry. Rather than merely adjusting to change…
…
continue reading