Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Spyware Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
…
continue reading
In a landscape saturated with directives, Focal Point prioritizes discussions over dictation. The show’s mission is to present diverse perspectives on hot topics and current events, encouraging viewers to form their own opinions. Focal Point is an IRONCLAD Original.
…
continue reading
Machines Like Us is a technology show about people. We are living in an age of breakthroughs propelled by advances in artificial intelligence. Technologies that were once the realm of science fiction will become our reality: robot best friends, bespoke gene editing, brain implants that make us smarter. Every other Tuesday Taylor Owen sits down with the people shaping this rapidly approaching future. He’ll speak with entrepreneurs building world-changing technologies, lawmakers trying to ensu ...
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Petra Söderling, the author of 'Governments and Innovation - the Economic Developer's Guide to Our Future', discusses the role governments play in creating new innovations, and innovation based industries. Intended audience: Economic Development and Foreign Direct Investment Professionals, Policy Makers, Civil Servants, CEOs, CFOs, R&D folks and tech enthusiasts. To subscribe to more free content go to https://petrasoderling.com/ Nothing in the show should be taken as investment advise.
…
continue reading
Whether its terrorists, anarchists, cyber criminals or nation states, America has a target on its back. WTOP National Security Correspondent J.J. Green investigates the threats facing the U.S., the people behind them, the agencies fighting them and their impact on Americans.
…
continue reading
Reckon you know who’s running Europe? Think again. Every week, we dive into a Follow the Money investigation exposing the continent’s hidden powerbrokers: from deceiving companies and influential lobbyists to corrupt politicians and financial fraudsters. Tune into our podcast and join our journalists as they reveal how they uncovered the truth and held power to account.Presented by Emma du Chatinier and Alexander Fanta.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
We discuss about the way to increase traffic
…
continue reading
Listen to all of Human Rights Watch's Twitter Space conversations in one convenient location.
…
continue reading
The Complete back up of No Agenda podcasts in case of deplatforming!
…
continue reading
We Cover the Cyberspace.
…
continue reading
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
…
continue reading
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
…
continue reading
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
…
continue reading
1
Shadow AI Is Eating the World, the Return of Hacking Team, and the Commercial Spyware Landscape
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28We don't do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we're just repeating the mistakes of previous tech waves in ignoring security until it's too late. Then we dig into a new report from Kaspersky about a crazy exploit they discovered…
…
continue reading
1
Operation ForumTroll: Chrome Zero-Day Tied to Italian Spyware Developer Memento Labs
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from Kaspersky, the campaign exploited a Google Chrome zero-day vulnerability (CVE-2025-2783) and targeted Russian and Belarusian organizations in government…
…
continue reading
1
Atlas browser hijacked, Bye, bye Twitter birdie, Dante spyware surfaces
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
…
continue reading
1
Risky Bulletin: iOS 26 change deletes clues of old spyware infections
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20A change in iOS is deleting-clues of old spyware infections, Starlink disables 2,500 terminals at scam compounds, a Caribbean hospital is still down 5 months after a ransomware attack, and officials are charged in Poland’s Pegasus spyware scandal. Show notes Risky Bulletin: iOS 26 change deletes clues of old spyware infections…
…
continue reading
1
Lawfare Daily: The State of the Spyware Industry with Jen Roberts and Sarah Graham
37:58
37:58
Play later
Play later
Lists
Like
Liked
37:58Jen Roberts, Associate Director of the Atlantic Council’s Cyber Statecraft Initiative, and Sarah Graham, Research Consultant with the Atlantic Council’s Cyber Statecraft Initiative, who are coauthors along with Nitansha Bansal of the recent paper, “Mythical Beasts: Diving Into the Depths of the Global Spyware Market,” join Lawfare’s Justin Sherman …
…
continue reading
1
European money is fueling the global spyware industry
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34A stranger reading your messages, tracking your movements, scrolling through your photos. That's what spyware can do – without you even knowing. It’s marketed as a tool to fight terrorism and crime, but it’s also used to silence journalists, activists, and political opponents.Greek journalist Vas Panagiotopoulos reveals how the EU and national gove…
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
1
Mexico Denies CIA’s Secret Role in Drug War — What’s Really Happening?
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07On today’s episode, Andy and Mike Baker break down Mexico’s president denying a Reuters report on the CIA’s covert role in the drug war. Full Reuters Report: https://www.reuters.com/world/americas/mexico-president-attacks-reuters-report-cias-role-countrys-drug-war-2025-09-12/ Buy Target Intelligence: PSYOP with Shawn Ryan: http://psyopshow.com/ Spo…
…
continue reading
1
Checklist 447 - iPhone Protections and Ghost Accounts
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45It's Halloween! There's a guy with an axe who wants to get into your iPhone! We'll talk about keeping him out. Plus - ghosts may not be real, but ghost accounts are. We'll tell you how to be a ghost account buster on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with u…
…
continue reading
1
Scaling Laws: The GoLaxy Revelations: China's AI-Driven Influence Operations, with Brett Goldstein, Brett Benson, and Renée DiResta
56:28
56:28
Play later
Play later
Lists
Like
Liked
56:28Alan Rozenshtein, Senior Editor at Lawfare, speaks with Brett Goldstein, Special Advisor to the Chancellor on National Security and Strategic Initiatives at Vanderbilt University; Brett Benson, Associate Professor of Political Science at Vanderbilt University; and Renée DiResta, Lawfare Contributing Editor and Associate Research Professor at George…
…
continue reading
1
LinkedIn AI opt-out, NSA leadership candidates, Python foundation withdraws
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
1
Risky Bulletin: Russia arrests Meduza Stealer group
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Russian police arrest the Meduza-Stealer trio, a Former L-3Harris manager pleads guilty to selling exploits to Russia, the US hacked Venezuela in 2020, and Windows 11 Administrator Protection goes live. Show notes Risky Bulletin: Russia arrests Meduza Stealer group
…
continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
continue reading
1
Rational Security: The “Tyler’s Revenge” Edition
1:09:46
1:09:46
Play later
Play later
Lists
Like
Liked
1:09:46This week, Scott sat down with his Lawfare colleagues Public Service Fellow Ari Tabatabai and Managing Editor Tyler McBrien to talk through the week’s big news in national security, including: “Great APEC-tations.” President Trump is headed to Asia this week, both for a meeting of the regional Asia-Pacific Economic Cooperation (APEC) organization a…
…
continue reading
1
Lawfare Daily: Why We Fall for Charlatans, with Quico Toro
30:39
30:39
Play later
Play later
Lists
Like
Liked
30:39On today’s episode, Lawfare Managing Editor Tyler McBrien sits down with Quico Toro, global opinion columnist at the Washington Post and Director of Climate Repair at the Anthropocene Institute, to talk about his new book, “Charlatans: How Grifters, Swindlers, and Hucksters Bamboozle the Media, the Markets, and the Masses,” which he wrote with his …
…
continue reading
1
LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
…
continue reading
1
Srsly Risky Biz: Peter Williams, Ex-ASD, Pleads Guilty to Selling Eight Exploits to Russia
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits. They also discuss a new report’s recommendation…
…
continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
continue reading
1
Android malware types like a human, sanctions weaken cyber ecosystems, side-channel extracts Intel, AMD secrets
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
…
continue reading
1
Lawfare Daily: NATO’s Eastern Flank: The View from Lithuania
49:12
49:12
Play later
Play later
Lists
Like
Liked
49:12Katsiaryna Shmatsina, Eurasia Fellow at Lawfare, sits down with Gabrielius Landsbergis, former Lithuanian Foreign Minister (2020–2024), now a visiting fellow at Stanford University, and Vytis Jurkonis, Associate Professor at Vilnius University and Director of Freedom House’s Lithuania office. They discuss Lithuania’s response to Russia’s full-scale…
…
continue reading
1
Palo Alto Networks Uncovers 194,000-Domain Smishing Campaign Linked to “Smishing Triad”
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38A global smishing campaign of unprecedented scale has been uncovered by Palo Alto Networks, revealing the vast operations of a Chinese-speaking threat actor known as the Smishing Triad. Since January 2024, the group has deployed more than 194,000 malicious domains, impersonating legitimate organizations ranging from toll and postal services to bank…
…
continue reading
A NATO corruption scandal made international headlines when several suspects were arrested across Europe earlier this year. But a cross-border investigation reveals that just a few months later, the United States quietly dropped charges against four of them – despite strong evidence. FTM journalists Jesse Pinster and Simon Van Dorpe reveal how one …
…
continue reading
1
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet
3:11:25
3:11:25
Play later
Play later
Lists
Like
Liked
3:11:25Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
…
continue reading
1
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet
2:55:51
2:55:51
Play later
Play later
Lists
Like
Liked
2:55:51Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
…
continue reading
HackingTeam’s successor is targeting Russia and Belarus, X users must re-enroll their security keys, Chrome will put HTTP behind a warning dialogue, and 15 people are expected to plead guilty in an Italian hacking scandal. Show notes Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days…
…
continue reading
1
Coveware Reports Historic Drop in Ransomware Payments: Only 23% of Victims Paid in Q3 2025
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57The global ransomware economy is collapsing under growing resistance from its targets. According to new data from cybersecurity firm Coveware, the third quarter of 2025 saw ransomware payments drop to a historic low, with just 23% of victims paying attackers—a continuation of a six-year downward trend. Even when ransoms were paid, the average payme…
…
continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
continue reading
1
Firefox Add-Ons Must Declare Data Collection—or Be Rejected
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Mozilla is taking a decisive step toward transparency and user control by requiring all Firefox extensions to disclose how they collect and handle personal data. The new mandate introduces a dedicated key—browser_specific_settings.gecko.data_collection_permissions—that every extension must include in its manifest file. Whether or not an extension c…
…
continue reading
1
Chainguard’s $3.5 Billion Valuation Signals Massive Investor Confidence in Secure-by-Default Software
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32Chainguard, the Kirkland, Washington-based cybersecurity company, has announced a landmark $280 million growth funding round led by General Catalyst’s Customer Value Fund (CVF), pushing its total capital raised to nearly $900 million and valuing the firm at $3.5 billion. This new round marks a pivotal phase for Chainguard as it shifts from product-…
…
continue reading
1
Lawfare Daily: State Cyber Corps and Volunteer Programs
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48Sarah Powazek, Director of the Public Interest Cybersecurity Program at UC Berkeley’s Center for Long-Term Cybersecurity, and Michael Razeeq, Nonresident Fellow at the Public Interest Cybersecurity Program, join Lawfare’s Justin Sherman to discuss the cyber threats facing states, what options and resources states currently have to address cybersecu…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
$1 Million WhatsApp Exploit Withdrawn—Researcher Silent, Meta Calls It “Low-Risk”
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
…
continue reading
1
Department of Know: Promoting passphrases, questioning international security conferences, gift card hackers
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Link to episode page This week's edition of The Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, operating partner and CISO, Craft Ventures, and Sasha Pereira, CISO, WASH Thanks to our show sponsor, ThreatLocker If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, po…
…
continue reading
1
OpenAI Atlas Omnibox Jailbreak Exposes New AI Security Flaw
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
Microsoft Rushes Emergency Fix for WSUS Remote Code Execution Flaw (CVE-2025-59287)
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
…
continue reading
1
Between Two Nerds: NSA gets its mojo back!
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04In this edition of Between Two Nerds Tom Uren and The Grugq dissect a recent Chinese CERT report that the NSA had hacked China’s national time keeping service. This episode is also available on Youtube. Show notes MSS Weixin post CN-CERT technical analysis Global Times on X BTN110: The NSA's nine to five hacking campaign…
…
continue reading