Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Infosec.Watch. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infosec.Watch or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

InfoSec.Watch Podcast — Episode 116: React2Shell mass exploitation, Apple & Microsoft zero-days, and the BRICKSTORM hypervisor breach

8:25
 
Share
 

Manage episode 524916375 series 3702279
Content provided by Infosec.Watch. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infosec.Watch or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This week’s episode dives into a packed slate of high-impact cybersecurity threats shaking the industry. We break down React2Shell (CVE-2025-55182) — a rapidly evolving remote code execution flaw driving mass scanning across the internet and prompting CISA to issue an urgent KEV directive. They also unpack Apple’s emergency WebKit zero-day patches and Microsoft’s latest actively exploited kernel and security-bypass vulnerabilities from December Patch Tuesday.

The team explores BRICKSTORM, a stealthy backdoor campaign targeting VMware vSphere hypervisors through fileless techniques and persistent access to virtualization control planes — a growing focus for state-sponsored actors. They then analyze the massive Global Mart data breach, a four-month compromise stemming from a single misconfigured cloud storage bucket.

Tool of the Week spotlights GreyNoise Threat Explorer, a powerful resource for separating malicious activity from internet background noise — especially valuable amid surging React2Shell exploitation.

The episode closes with a look at Phantom Voice, a new wave of AI-generated voice-cloning phishing attacks capable of convincingly mimicking executives to trigger financial fraud and data exposure.

Topics Covered:

  • React2Shell RCE and widespread exploitation
  • Apple & Microsoft zero-day patches underway
  • BRICKSTORM: hypervisor-level persistence against VMware
  • Global Mart breach impacting 50M customers
  • GreyNoise Threat Explorer
  • Phantom Voice AI-driven voice-clone phishing

Stay ahead of emerging threats at infosec.watch and follow us on X, Facebook, and LinkedIn.

  continue reading

5 episodes

Artwork
iconShare
 
Manage episode 524916375 series 3702279
Content provided by Infosec.Watch. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infosec.Watch or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This week’s episode dives into a packed slate of high-impact cybersecurity threats shaking the industry. We break down React2Shell (CVE-2025-55182) — a rapidly evolving remote code execution flaw driving mass scanning across the internet and prompting CISA to issue an urgent KEV directive. They also unpack Apple’s emergency WebKit zero-day patches and Microsoft’s latest actively exploited kernel and security-bypass vulnerabilities from December Patch Tuesday.

The team explores BRICKSTORM, a stealthy backdoor campaign targeting VMware vSphere hypervisors through fileless techniques and persistent access to virtualization control planes — a growing focus for state-sponsored actors. They then analyze the massive Global Mart data breach, a four-month compromise stemming from a single misconfigured cloud storage bucket.

Tool of the Week spotlights GreyNoise Threat Explorer, a powerful resource for separating malicious activity from internet background noise — especially valuable amid surging React2Shell exploitation.

The episode closes with a look at Phantom Voice, a new wave of AI-generated voice-cloning phishing attacks capable of convincingly mimicking executives to trigger financial fraud and data exposure.

Topics Covered:

  • React2Shell RCE and widespread exploitation
  • Apple & Microsoft zero-day patches underway
  • BRICKSTORM: hypervisor-level persistence against VMware
  • Global Mart breach impacting 50M customers
  • GreyNoise Threat Explorer
  • Phantom Voice AI-driven voice-clone phishing

Stay ahead of emerging threats at infosec.watch and follow us on X, Facebook, and LinkedIn.

  continue reading

5 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play