Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Sql Injection Podcasts

show episodes
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
Artwork
 
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Loading …
show series
 
On this episode of The AppSec Insiders Podcast, we dive into CVE-2025-25257, a Fortinet FortiWeb Fabric Connector SQL injection vulnerability that escalates to RCE. We break down how this exploit works, why it’s so impactful, and what lessons organizations can learn, from proper network segmentation to the importance of SAST in your pipeline. We al…
  continue reading
 
In this episode of Executive IT, host Evan Kiely sits down with Alan Taylor, COO of Maxio, to explore how IT and security shape business reliability, compliance, and growth. Alan shares his perspective as a seasoned operator in private-equity backed SaaS companies, covering: Why IT and security are non-negotiable investments for scaling businesses …
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis sits down with Katie Bleichman, Director of CX Operations and Enablement at Automox. Katie shares her inspiring journey from two decades in elementary education to leading customer experience in the SaaS and cybersecurity world. Discover how skills from the classroom translate into IT, what it …
  continue reading
 
In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with dis…
  continue reading
 
Stay ahead of September 2025 Patch Tuesday. Automox experts Ryan Braunstein, Henry Smith, and Seth Hoyt break down three high-impact items you need to act on now: Hyper-V privilege escalation, XAML/Phone Link elevation paths, and an NTFS remote code execution. You’ll get: Clear patch priorities and timing. Likely attack paths and real-world detecti…
  continue reading
 
In the second half of this crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado shift from defining IT problems to actually building, testing, and refining solutions. They dig into choosing the right tools without getting lost in endless options, the value of learning from APIs and documentation, and why “don’t rei…
  continue reading
 
In this special crossover between Hands On IT and Automate IT, hosts Landon Miles and Jeremy Maldonado dive into the building blocks of IT solutions. They share practical ways to approach automation without the overwhelm—starting from defining real-world problems and breaking them into manageable steps. Along the way, they explore Linux as a proble…
  continue reading
 
A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
  continue reading
 
It’s not just a show, it's a lifeline for how to unscary a seemingly daunting career journey – no matter where you're at in your IT or security hustle. From super-talented IT cartoonist and influencer marketing service agency co-owner, Forrest Brazeal, and gifted Automox VP of Customer Experience, Charles Coaxum, to the sagely verbose CISO and VP o…
  continue reading
 
In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of resilience and adaptability in the IT field as we enter 2025. He emphasizes the need for personal and team resilience, effective communication, and the ability to learn from setbacks. The conversation covers practical steps for achieving IT resilience, includin…
  continue reading
 
Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, p…
  continue reading
 
Join Automox cybersecurity experts Ryan Braunstein and Mat Lee for August 2025’s Patch [FIX] Tuesday, covering a Hyper-V privilege escalation, an Azure Virtual Machines spoofing flaw, and four serious SQL Server vulnerabilities. Learn how attackers could chain virtualization and cloud exploits, why crafted VHDX files and spoofed certificates are da…
  continue reading
 
In this episode of Hands-On IT, host Landon Miles sits down with special guest Forrest Brazeal to explore the current state of IT careers and the evolving role of AI in the tech landscape. As a renowned cloud architect and co-founder of Freeman and Forrest, Forrest shares his insights on upskilling for today’s competitive job market, the real impac…
  continue reading
 
In this episode of Automox Insiders, Maddie Regis speaks with Ryan Jeziorski, a Solutions Engineer at Automox, about the importance of IT adaptability and resilience. Ryan shares his diverse career background, his current role at Automox, and insights on how organizations can maintain uninterrupted services while adapting to changes in technology. …
  continue reading
 
Maddie Regis speaks with Tom Bowyer, Director of Security at Automox, about the intersection of IT and cybersecurity. Tom shares his career journey, the importance of collaboration between IT and security teams, and insights into SOC compliance reports. He emphasizes the need for transparency, experimentation, and proactive problem-solving in enhan…
  continue reading
 
In this episode of Hands-On IT, host Landon Miles is joined by Automox Security Engineer Henry Smith for a deep dive into prompt engineering and how it’s transforming the way IT and security teams work with AI. From crafting high-quality prompts to auditing and hardening code using large language models like Claude and ChatGPT, Landon and Henry sha…
  continue reading
 
In this episode, we unpack CVE-2025-49596, where prompt injection, CSRF, and localhost access were chained to achieve RCE in the MCP Inspector AI tool. Learn how the exploit worked, what it reveals about LLM security risks, and how to defend against similar threats with sandboxing, access controls, and DevSecOps monitoring.…
  continue reading
 
One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
  continue reading
 
Discover how Automox is transforming IT reporting. In this episode, Steph Rizzuto talks with product lead Emily Pace and engineer Ben Glass about new reporting features that give you real-time visibility, alerting, and automation. Learn how IT teams are cutting reporting time from 30 hours to 1, setting up custom alerts, and making smarter decision…
  continue reading
 
In this episode of Heroes of IT, Ashley sit down with Milton Webster to explore how his team transformed their IT operations using Automox. From reducing endpoint risk scores in record time to implementing automated Windows 11 upgrades with Worklets, Milton shares real-world wins and challenges from the frontlines of IT. Learn how a culture of proa…
  continue reading
 
In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in. Here's the setup: a user unknowingly reuses compromised credentials with the company’s SSO provider.…
  continue reading
 
In this episode of Automox's CISO IT Podcast, host Jason Kikta returns from Black Hat and DEF CON in Las Vegas to discuss one of the most talked-about IT events of the summer, and what it truly reveals about automation in IT. Contrary to popular fearmongering, Jason argues that the incident isn’t a cautionary tale against automation but a clear cal…
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis sits down with Kat Breeggemann, Digital Customer Experience Manager at Automox, to explore her unique journey from journalism and communications into the world of customer success. Kat shares how a leap-of-faith internship opened the door to a career in CX, the pivotal moment she advocated for …
  continue reading
 
In this July 2025 Patch [FIX] Tuesday episode, Automox security experts Tom, Seth, and Cody unpack four high-impact threats — from Microsoft updates, to Linux vulns, and .zip exploit PoCs. Topics include a physical attack method bypassing BitLocker encryption (CVE-2025-48001), the looming expiration of secure boot certificates, a Linux privilege es…
  continue reading
 
In this episode of Executive IT, host Evan Kiely and guest JB Snodgrass discuss the intricacies of procurement processes, effective negotiation strategies, the importance of timing and communication, and common pitfalls to avoid when evaluating tools. JB shares insights from his extensive experience in procurement, emphasizing the need for thorough…
  continue reading
 
With a newborn at home and fueled by coffee (and Linux), Jeremy reflects on what it means to support both technology and people. In this episode, Jeremy tackles some of IT’s toughest challenges — maintaining balance, fostering gratitude, and safeguarding your mental health. Whether you’re rebooting servers at 2 am, automating backend workflows, or …
  continue reading
 
Ashley sits down with Steve Engler from the Oklahoma Farm Bureau to explore his journey from taking apart his first computer to becoming a certified Automox expert and system admin. Stephen shares how he: Transitioned from the Air Force into IT Unlocked the full potential of Automox in a previously underused environment Built a hands-on lab to test…
  continue reading
 
One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyd…
  continue reading
 
Ready or not, Windows 11 is here. In this episode of Product Talk, Peter and Steph break down how IT teams can simplify the Windows 10 to 11 migration — without disrupting users or pulling all-nighters. From Worklets for readiness checks and silent upgrades to insights on hardware eligibility and inventory improvements, learn how to take control of…
  continue reading
 
In this episode of IT Insiders, host Maddie Regis sits down with Ted Harapat, Senior Systems Engineer at Automox, for a candid and compelling look into the world of Linux, cybersecurity, and the origins of IT careers. Ted shares how a midnight knock on his window sparked a decades-long journey into IT, what it’s like to support and expand Automox’s…
  continue reading
 
How can IT and the business work better together—without sacrificing speed, security, or sanity? In this episode of Executive IT, host Evan Kiely is joined by Volker Otto, a seasoned IT executive, to explore how teams can bridge the gap between user experience and technical requirements. They dive into the rise of business relationship managers, ma…
  continue reading
 
In this episode, Landon Miles interviews Jon Levenson, the manager of content and community at Automox, about the importance of creativity in IT and how to foster a creative environment. Jon shares his background as a former actor and how he fell into tech, as well as his experience in copywriting and podcast writing. They discuss the key elements …
  continue reading
 
June’s Patch [FIX] Tuesday unpacks a lighter-than-usual Windows patch cycle — but don’t get too comfortable. Join Automox cybersecurity experts as they break down high-risk vulnerabilities across macOS and Windows, including: A chained SSH vulnerability (CVE-2025-26465 & CVE-2025-26466) that allows memory exhaustion and bypasses host key verificati…
  continue reading
 
Is tech easier than people? For many IT pros, the answer is a resounding yes. In this episode, Landon Miles tackles one of IT’s biggest challenges: managing user expectations while maintaining your own mental wellbeing. You’ll learn how to balance empathy with efficiency using proven frameworks like ITIL, SRE, and the NIST Cybersecurity Framework. …
  continue reading
 
In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of engaging with executive teams and the necessity of clear communication within organizations. He emphasizes the value of understanding team dynamics, preparing effectively for discussions, and aligning goals with organizational priorities to foster collaboration…
  continue reading
 
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server. In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single…
  continue reading
 
RSA 2025 revealed a shift: identity is now a primary threat vector in cloud security. In this episode, Jason Kikta breaks down the key takeaways from the conference—why identity has overtaken malware, how threat actors exploit service accounts and IDPs, and what this means for modern defense strategies. Plus, Jason shares observations on the evolvi…
  continue reading
 
In Episode 17 of Product Talk, Peter Pflaster and Steph Rizzuto walk you through the latest enhancements in the Automox console that help you work smarter — not harder. Discover how the new Agent Configuration settings let you choose between stable and beta release channels, control auto-upgrades, and manage endpoint behavior — all without submitti…
  continue reading
 
In this episode of Hands-On IT, Landon Miles shares 3 tactical tips to help you make smarter decisions with your endpoint data. Learn how to cut through alert fatigue, streamline your reporting, and use historical insights to predict and prevent future issues. Whether you're managing a few hundred devices or thousands across mixed OS environments, …
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis sits down with Peter Pflaster and Kelly Carlson from Automox’s product marketing team to explore how data transforms endpoint management. From mean time to remediate (MTTR) to device compliance and unexpected user activity trends, they break down the metrics IT pros should watch — and why clear…
  continue reading
 
Procurement is no longer just a gatekeeper — it’s a strategic driver in IT and security decisions. In this episode of Executive IT, host Evan Kiely sits down with Courtney Adams, a veteran procurement leader, to explore how smart procurement empowers better, faster, and more secure tech investments. From understanding true cost drivers to leveragin…
  continue reading
 
Mayday. Mayday. May Patch Tuesday? This month’s episode dives into four key Windows vulnerabilities you need to address — from scripting engine memory corruption in legacy Internet Explorer components to remote code execution risks in Remote Desktop and Visual Studio. Ryan Braunstein and Mat Lee unpack what each CVE means for your environment, how …
  continue reading
 
In this episode of Autonomous IT, Live!, Landon Miles hosts leads a three-part discussion focused on spring cleaning your IT systems, workflows, and personal well-being. You’ll hear candid, practical insights from IT professionals tackling burnout, technical debt, and infrastructure hygiene head-on. This live show originally aired April 16, 2025 💼 …
  continue reading
 
Think your password is enough? Think again. In this episode of Teach IT, we break down what multi-factor authentication (MFA) really is — and why it’s one of the smartest ways to secure your accounts. You’ll learn how MFA works, the difference between SMS codes, authenticator apps, biometrics, and physical security keys, and why phishing-resistant …
  continue reading
 
In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management—breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intelligent reporting, asset intelligence, and risk scoring can transform how IT teams manage and secure their environments. Drawing from his own journey in…
  continue reading
 
Spring is in the air, and it’s time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups,…
  continue reading
 
A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis chats with Adam Whitman, Manager of Solutions Engineering at Automox, about all things IT spring cleaning. From patch management and software audits to business continuity planning and endpoint hygiene, Adam shares practical, real-world tips for tidying up your tech stack and staying ahead of I…
  continue reading
 
In this episode, Ashley chats with Casey Merritt from Right Systems about how he manages patching and automation across both internal systems and MSP clients using Automox. Casey shares how he transitioned into IT, took ownership of Automox at his company, and now uses Worklets to streamline software removal, automate reporting, and reduce onboardi…
  continue reading
 
Is your tech stack getting out of hand? In this episode, Automox General Counsel Paul Shoning joins Evan Kiely to unpack the legal and strategic risks of IT tool consolidation. From budgeting overlap to vendor lock-in, learn how to clean up your stack without making a mess.By Automox
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play