Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
…
continue reading
Citrix Podcasts
Combining two technologies can often be cumbersome. Every other Monday, join Neil C Hughes, a tech columnist and #1 best-selling author on Amazon, as he interviews technology companies on the latest tech they’ve developed and their integration with Citrix. If you are a tech enthusiast looking for how Citrix technology alliances have solved industry challenges and empowered people to unlock their full potential, this podcast is for you.
…
continue reading
Take control of your digital workspace environment end-to-end AND make your end-users happy with their experience. Join Eugenia Schipelliti and Jeff Johnson as they interview industry leaders, customers, and tech gurus on how ControlUp is the simplest, most cost-effective way to observe, analyze and optimize your employees’ digital experience. They’ll help you understand the technology, trends in the industry, and best practices with digital workspaces so you can understand how to keep your ...
…
continue reading
ControlUp Community Radio: The Premier Podcast for IT Insights and Innovations. Join your host, Douglas Brown, as he engages with the leading minds in the realm of End-User Computing (EUC), Digital Employee Experience (DEX), and the broader desktop computing landscape. Delve into candid conversations that unveil the pulse of the technology world—without any preset script. Our guests, ranging from industry pioneers to key players, share their invaluable experiences, providing you with actiona ...
…
continue reading
Stop living in the past. With technology changing, it's important to be aware of the latest features, functionality, and best practices. Join Steve Beals as he interviews the tech experts that helped design, build and deploy the latest Citrix technology. They'll help you understand how the magic works so you can impress others with your Citrix knowledge and expertise. So subscribe, tune in, and geek out with us on The Click-Down. Follow Steve Beals on X (formally Twitter) @SRBeals
…
continue reading
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
Explore and learn about the present and future of application delivery and security, and how to solve the business challenges facing IT teams and end users.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
This weekly podcast focusses in on the incredible power of Citrix Podio, and the impact it can have on your business when it is implemented properly. We focus in on three key types of episodes: Partner Profiles - In these episodes we speak with different Podio Partners to learn first-hand about their business, their journey with Podio, some of the key systems they have designed, and their key hints and tricks they can't live without. Client Stories - In these episodes we'll be interviewing d ...
…
continue reading
A proven professional with international and domestic marketing, branding and sales experience in the consumer and business-to-business industries. Built a reputation on consistently driving the profitable growth and market success by focusing on market share, brand awareness and building the business bottom line for such renowned brands as Citrix Online, Philips Electronics, Norelco, Marantz, Magnavox, Netgear and Honeywell. Honors graduate and faculty member of Florida International Univer ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
NetScaler application delivery and security solutions are designed to ensure that business-critical applications perform well and remain secure. Centered around a comprehensive application delivery controller and advanced WAN, these solutions help companies succeed by ensuring an optimal user experience.
…
continue reading
Join Phoummala Schmitt, Theresa Miller and Melissa Palmer as they discuss technology and IT trends in a way that will not have you hitting the snooze button.
…
continue reading
Innovation by design is a pilot project of members of DTX and the Design@Business Community in collaboration with the Center for Business Innovation at Chalmers University of Technology to explore podcasts as a way to share community knowledge and gain research insights.
…
continue reading
The Art of the Pivot brings you an executive perspective on the trends, challenges and triumphs experienced by today’s most transformative business leaders. Our conversations will take listeners into the mind of decision-makers at their most critical - or shall we say, pivotal - moments. Subscribe today and learn business transformation lessons you won’t hear anywhere else. Learn more about Signavio here: https://bit.ly/2IMD7Am
…
continue reading
In the Wheels Up Travel Podcast, Rick Versace Jr. reaches out to Travel Professionals across different industries to learn about the people behind the scenes in the travel industry. Listen as Rick interviews Corporate Travel Managers, Meetings and Event Planners, Road Warriors, and Business Owners and Executives to learn about how they have been successful in the travel industry so far and hear a little about where the travel industry will be going! Support this podcast: https://podcasters.s ...
…
continue reading
"Fireside MSP" is a warm, engaging podcast brought to you by the Managed Service experts at XenTegra, where technology meets conversation around the virtual fireside. Each episode dives deep into the world of managed services, exploring the latest trends, solutions, and innovations that are shaping the future of technology. Hosted by seasoned professionals from XenTegra and featuring occasional guest appearances from our industry partners, "Fireside MSP" aims to demystify the complex world o ...
…
continue reading

1
Expanding Citrix DaaS with Amazon WorkSpaces Core Managed Instances
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06In Episode 184 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to explore the newly enhanced integration between Citrix DaaS and Amazon WorkSpaces Core Managed Instances. The team dives into what's new in this “version 2” release, how it enables flexible, cost-effective VDI deployment, and why it’s a…
…
continue reading

1
CYFIRMA Research: CVE-2025-5777– Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00Critical Alert: CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)! Organizations relying on Citrix NetScaler ADC and Gateway for secure remote access must act immediately. This newly uncovered vulnerability allows unauthenticated attackers to leak sensitive memory—including session tokens—by sending malformed authentication r…
…
continue reading

1
Urgent Cyber Threats: Citrix Exploit, Fortinet RCE, and AI Vulnerabilities
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet’s FortiWeb also fa…
…
continue reading

1
Citrix Bleed 2, Scattered Spider Hits Aviation
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2 Scattered Spider Hits Aviation From ClickFix to FileFix Ransomware Threats from Q2 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June …
…
continue reading

1
Full CrushFTP Attack Chain, Plus BreachForums is Back!
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
…
continue reading

1
Cybersecurity Today: Major Data Leaks, Airline Disruptions, Malware in Games, and AI Bypasses Captchas
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49In this episode of 'Cybersecurity Today,' host Jim Love covers several significant cybersecurity incidents. Hackers disrupt all Aeroflot flights, causing massive delays in Russia. The women-only dating app 'Tea' faces a second serious data leak, exposing 1.1 million private messages. A game on Steam named 'Camia' is found to contain three types of …
…
continue reading

1
Amazon AI Tool Hacked, Scattered Spider Attacks VMware, and Major Ransomware Takedown | Cybersecurity Today
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09In this episode of Cybersecurity Today, host David Shipley covers several key incidents impacting the cybersecurity landscape. Amazon's generative AI coding assistant 'Q' was compromised by a hacker who injected data-wiping code into the tool's GitHub repository. Scattered Spider, a notorious cybercrime group, continues its malware attacks on VMwar…
…
continue reading

51
The Evolution and Defense Against Advanced Phishing Attacks
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering. In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, expl…
…
continue reading

1
CYFIRMA Research: EdskManager RAT- Multi-Stage Malware with HVNC and Evasion Capabilities
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15CYFIRMA research provides an analysis of a newly identified Remote Access Trojan, EdskManager RAT, which exhibits stealthy infection mechanisms and covert control using HVNC. Key Capabilities: · Multi-stage infection using signed binaries and encrypted config · HVNC-based hidden window interaction · Browser extension profiling (Chrome, Edge, Brave)…
…
continue reading

1
Sharepoint Hack Reaches Crisis Level and more: Cybersecurity Today for July 25, 2025
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07The recent Sharepoint hack is spreading like wildfire through unpatched systems. All this and more on today's episode with guest host David Shipley.By David Shipley
…
continue reading

1
Why IT Needs Deep Visibility for Application Rollouts
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25In Episode 183 of The Citrix Session, host Bill Sutton is joined by Citrix experts Geremy Meyers and Todd Smith to break down how IT leaders can make smarter decisions when rolling out Windows 365. They explore the growing importance of deep visibility, flexible deployment models, and persona-based strategies to support modern hybrid environments. …
…
continue reading

51
New SharePoint Flaw, How Cybercriminals Use AI
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34) LameHug AI-Powered Malware (5:55) UK Bans Ransomware Payments (9:44) AI Tactics Behind the Latest Cyber Threats (14:11) Kim B…
…
continue reading

101
Having some technical problems with podcast distribution.
0:50
0:50
Play later
Play later
Lists
Like
Liked
0:50We're having some issues with podcast distribution. We're going to take a couple of days to figure out what is going on and what, if anything, we can do about it.By Jim Love
…
continue reading

1
XenServer 8.4: A New Era of Virtualization for All Workloads
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35In Episode 182 of The Citrix Session, host Bill Sutton and Citrix’s Todd Smith dive into the expanded capabilities of XenServer 8.4, Citrix’s enterprise-grade hypervisor. No longer just for Citrix workloads, XenServer is now fully supported for all workloads under both Citrix Platform Licensing and UHMC—making it a strong contender for organization…
…
continue reading

101
NPM Linter Packages Hijacked, Microsoft's China Issue, and AI in Phishing Attacks: Cybersecurity Today:
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06In this episode of Cybersecurity Today, host David Shipley discusses several pressing cybersecurity issues. First, popular NPM Linter packages were hijacked via phishing to spread malware, affecting millions of downloads. Concurrently, Ukrainian CERT uncovers new phishing campaigns tied to APT28 using large language models for command and control. …
…
continue reading

1
Exploring the Dark Side of AI: Risks, Consciousness, and Responsibility
1:05:50
1:05:50
Play later
Play later
Lists
Like
Liked
1:05:50The Cybersecurity Today episode revisits a discussion on the risks and implications of AI hosted by Jim Love, with guests Marcel Gagné and John Pinard. They discuss the 'dark side of AI,' covering topics like AI misbehavior, the misuse of AI as a tool, and the importance of data protection in production environments. The conversation delves into wh…
…
continue reading
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
…
continue reading

1
Cybersecurity Today: DNS Malware, SonicWall Backdoor, Military Breach, and BigONE Crypto Hack
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31In today's episode, host Jim Love covers recent cybersecurity threats, including malware hidden in DNS records, a custom backdoor targeting SonicWall SMA devices, the US military assuming a network compromise after Chinese hackers targeted VPNs and email servers, and a $27 million theft from the BigONE crypto exchange. The show highlights how attac…
…
continue reading

1
Do You Really Need IOCs? Plus Zero-Day Exploits, AI Data Leaks, and Phishing for VIPs
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware- June 2025
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
…
continue reading

1
Cybersecurity Today: GPU Vulnerabilities, Microsoft's Security Overhaul, and Major Flaws in Automotive Bluetooth
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08In this episode hosted by Jim Love, 'Cybersecurity Today' celebrates its recognition as number 10 on the Feed Spot list of Canadian News Podcasts and approaches a milestone of 10 million downloads. Key topics include new research identifying Nvidia GPUs as vulnerable to Rowhammer style attacks, Microsoft's significant security improvements in Micro…
…
continue reading

1
What’s New and What’s Next at Citrix: LTSR, UHMC, Secure Browsers & More
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17In Episode 181 of The Citrix Session, hosts Bill Sutton and Todd Smith dive into the key takeaways from the blog “What’s New and Next with Citrix: Q&A from our May 2025 Webinar.” From release cadence updates and licensing clarity to enhanced integration with Windows 365 and Nutanix, this episode is packed with forward-looking insights for Citrix ad…
…
continue reading

1
CYFIRMA Research- RENDERSHOCK- Weaponizing Trust in File Rendering Pipelines
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58New Threat Model: Zero-Click Compromise via File Rendering Automation RenderShock introduces a powerful new attack framework that leverages trusted file previewing, indexing, and sync mechanisms to trigger payloads — without exploits, macros, or even opening the file. Key Highlights: Zero-click execution using passive system features. Payloads deli…
…
continue reading

1
CYFIRMA Research- GitHub Abused to Spread Malware Disguised as Free VPN
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
…
continue reading

1
Cybersecurity Month in Review: Key Insights and Emerging Threats July 11, 2025
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts…
…
continue reading

1
Cybersecurity Today: Marks and Spencer Hack, Brazilian Bank Breach, and McDonald's Data Vulnerability
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46In this episode of Cybersecurity Today, host Jim Love discusses major updates on the recent cyber attack on Marks and Spencer, revealing new details and arrests. The breach involved sophisticated social engineering that infiltrated the company's network through an IT service provider, leading to 150GB of stolen data. Love then covers a massive insi…
…
continue reading

1
SafePay Ransomware Rises, North Korea Adopts ClickFix
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
…
continue reading

1
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
…
continue reading

1
CYFIRMA Research- Phishing Attack: Deploying Malware on Indian Defense BOSS Linux
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20CYFIRMA uncovers a sophisticated phishing campaign by APT36 (Transparent Tribe) leveraging Linux-specific malware on BOSS Linux systems (widely used by Indian government agencies). Attackers use malicious .desktop files to deploy stealthy ELF binaries while distracting users with fake PowerPoint files. Stay vigilant and safeguard critical infrastru…
…
continue reading

1
Ingram Micro Ransomware Attack and the Rise of Linux SSH Server Compromises
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
…
continue reading

1
AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50In this episode of Cybersecurity Today, host Jim Love engages in a comprehensive conversation with Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They delve into the stark difference between perceived and actual preparedness for cybersecurity in the face of growing AI adoption. The discussion spans topics such as the rol…
…
continue reading

1
Demystifying Amazon Workspaces with ControlUp
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59In this episode of The Upload with ControlUp, Jeff and Eugenia dive into the world of Amazon Workspaces—breaking down the different types (personal, pooled, core, and AppStream), and how ControlUp enhances visibility, manageability, and user experience across them. From shared responsibility models to peripheral frustrations and endpoint diagnostic…
…
continue reading
12-Day War update: Israel and Iran agree to a fragile ceasefire after America's bombing run on Tehran's nuclear facilities. Link to the Research Report: https://www.cyfirma.com/research/12-day-war-update/ #OperationRisingLion #MidnightHammer #IsraelIran #Geopolitics #CYFIRMAResearch #ThreatIntelligence #cybersecurity #ETLM #currentaffairs #MiddleEa…
…
continue reading

1
Episode #19 - Conversation with Beau Dolinsky, VP of Customer Experience at ControlUp
35:44
35:44
Play later
Play later
Lists
Like
Liked
35:44Tune in to Episode #19 of ControlUp Community Radio, where host Douglas Brown interviews Beau Dolinsky, Vice President of Customer Experience at ControlUp. Beau shares insights from his impressive career, including roles at Citrix and Zoom, and discusses his passion for creating exceptional experiences. Beau emphasizes the value of a "customer-obse…
…
continue reading

1
Criminal Organizations Exploit UTS, Airlines Hit by Cyber Attacks, and Supreme Court Upholds Porn ID Law
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58In today's episode of Cybersecurity Today, hosted by David Shipley, a report from the US Department of Justice unveils how criminal organizations use Ubiquitous Technical Surveillance (UTS) to track and kill FBI informants. Hawaiian Airlines experiences a cyber attack, potentially involving ransomware. The Supreme Court upholds Texas's age verifica…
…
continue reading

1
Citrix + Nutanix: The Easy Button for VDI Management
27:01
27:01
Play later
Play later
Lists
Like
Liked
27:01Managing virtual desktops doesn’t have to be hard. In Episode 180 of The Citrix Session, Bill Sutton is joined by Citrix’s Todd Smith and Geremy Meyers—and special guest Phil Sellers from XenTegra—to break down the latest innovations from the Citrix + Nutanix partnership. What’s New & Why It Matters: One Integration Point: Citrix now supports Prism…
…
continue reading

1
Bridging the Gap: AI and Cybersecurity in the Enterprise
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50In this episode of Cybersecurity Today, host Jim Love is joined by Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They begin the discussion with a report from Accenture that highlights the gap between the perceived and actual preparedness for cybersecurity as AI becomes more integrated into business operations. Jim and K…
…
continue reading

1
Max Severity Flaws, Massive Exploits, and AI Security: A Cybersecurity Briefing
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23In this episode of 'Cybersecurity Today,' host Jim Love discusses urgent cybersecurity threats and concerns. Cisco has issued emergency patches for two maximum severity vulnerabilities in its Identity Services Engine (ISE) that could allow complete network takeover; organizations are urged to update immediately. A popular WordPress theme, Motors, h…
…
continue reading
Odyssey Stealer, a rebranded version of Poseidon Stealer, targets macOS users through the Clickfix technique—tricking victims into copy-pasting malicious scripts into their terminal. With capabilities to steal hardware details, keychains, browser cookies, crypto wallets, and plugins, the stolen data is sent to the stealer's hosted infrastructure. D…
…
continue reading

1
Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
…
continue reading

1
Cybersecurity Today: Balancing Trust, Risks, and Innovations
13:17
13:17
Play later
Play later
Lists
Like
Liked
13:17In this episode of Cybersecurity Today, host Jim Love discusses various pressing issues and trends in the realm of cybersecurity. The episode starts with a revelation from Okta's 2025 Customer Identity Trends report, which highlights the conflicting digital behaviors of Canadians who, despite their fear of identity theft, often reuse passwords acro…
…
continue reading

1
Rising Costs, Aging Hardware, & One Smart Way Forward
21:23
21:23
Play later
Play later
Lists
Like
Liked
21:23As hardware costs climb and Windows 11 migration looms, IT leaders face a tough choice: upgrade or optimize. In Episode 179 of The Citrix Session, Bill Sutton (XenTegra) and Todd Smith (Citrix) unpack a smarter path—repurposing aging hardware with Citrix Elux and Scout. Why Listen: Learn how tariffs and supply chain delays are impacting endpoint st…
…
continue reading

1
CYFIRMA Research- APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Cyber Threat Alert: APT36 Targets Indian Defense with a Sophisticated Phishing Campaign! CYFIRMA has uncovered a targeted cyber-espionage operation by APT36 (Transparent Tribe), a Pakistan-based threat actor. This group is exploiting phishing emails embedded with malicious PDFs mimicking official NIC documents to infiltrate Indian defense systems. …
…
continue reading

1
Cybersecurity Today: Chinese Hackers Target Canadian Telco, U.S. on Alert for Iranian Cyber Retaliation, and Sitecore XB Critical Vulnerability
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03In this episode of Cybersecurity Today, hosted by David Shipley, key cybersecurity incidents and threats are discussed. The Canadian Center for Cybersecurity revealed a breach by Chinese state-sponsored hackers of a Canadian telco, with further threats expected to continue targeting Canadian critical infrastructure. The U.S. braces for potential Ir…
…
continue reading

1
AI Vulnerabilities and the Gentle Singularity: A Deep Dive with Project Synapse
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59In this thought-provoking episode of Project Synapse, host Jim and his friends Marcel Gagne and John Pinard delve into the complexities of artificial intelligence, especially in the context of cybersecurity. The discussion kicks off by revisiting a blog post by Sam Altman about reaching a 'Gentle Singularity' in AI development, where the progress t…
…
continue reading

1
Exposing Cybersecurity Threats: Breaches, Vulnerabilities, and Evolving Malware
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365’s enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain r…
…
continue reading

1
Israel-Iran Cyber Warfare, Anubis Ransomware, and More Attacker Trends
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: May 2025
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04Stay ahead of evolving ransomware threats with CYFIRMA’s May 2025 Ransomware Report. May witnessed a 15.95% spike in ransomware attacks compared to April, with 545 incidents logged globally. New actors like SafePay and SilentRansomGroup rapidly gained ground, while established groups like Qilin deployed advanced loaders like NETXLOADER and SmokeLoa…
…
continue reading

1
Scattered Spider Targets US Insurance, Microsoft Zero-Day, Major Database Breach, and AI Poison Pill
11:14
11:14
Play later
Play later
Lists
Like
Liked
11:14In this episode, host Jim Love delves into recent cybersecurity threats and breakthroughs. The notorious Scattered Spider hacker group has shifted its focus to US insurance companies after attacking UK retailers earlier this year. Microsoft's urgent security updates address active zero-day vulnerabilities that allow complete system control. Researc…
…
continue reading

1
CYFIRMA Research: Understanding CyberEye RAT Builder- Capabilities and Implications
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30CYFIRMA’s latest research report analyses a stealthy Windows-based malware known as CyberEye, which is posing a significant threat across systems by offering attackers full remote control through a Telegram Bot API. Once executed, it silently harvests browser-stored passwords, cookies, credit card details, Wi-Fi credentials, and session tokens from…
…
continue reading