Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Vulnerability Exploits Podcasts

Series
Series
Episodes
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show episodes
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
D
DIY Cyber Guy
DIY Cyber Guy podcast artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Think about all of the things you consider every day to help keep yourself, your loved ones, and your community happy, healthy, and hopeful. Now consider this: There is an ever-growing body of research demonstrating significant negative impacts, for yourself and the ones you love, in the consumption of pornography. It can change the way you think, harm your ability to connect with other people, and can contribute to changing the world in negative ways. Join us every other week as we consider ...
  continue reading
 
T
The Breach Report
The Breach Report podcast artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
S
Shame Spiral
Shame Spiral podcast artwork

1
Shame Spiral

Ely Kreimendahl

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A comedy podcast about shame- because no one roasts you harder than yourself! Each week, psychotherapist-turned-comedian Ely Kreimendahl exploits her therapy skills to talk all-things-shame with a new special guest. Every guest shares a core story of something that once made them spiral HARD, answers both silly and emotionally complicated questions, and even if these conversations are ACCIDENTALLY therapeutic, it's not therapy.... Ely goes ALL IN on sharing her shame, too. Does coming togeth ...
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Human trafficking is one of the greatest injustices in our world today. It’s the exploitation of vulnerable people for their bodies and labor. It’s modern-day slavery, and it’s generating billions of dollars each year. In this podcast, we will unpack the problem of human trafficking, share powerful stories from the frontlines, hear from thought leaders in the fight for freedom, and equip you to make a difference–right where you are. A21 is a global anti-human trafficking organization operati ...
  continue reading
 
15 Minutes with the Boss is a podcast that gives listeners exclusive access to some of the top CEOs in the country. Each week AFR BOSS editor Sally Patten sits down with a prominent leader and asks them to share the invaluable advice and wisdom they have accumulated throughout their careers. For stories of success and failure and everything in-between, search and follow 15 Minutes with the Boss. It’s 15 minutes you can’t afford to miss.
  continue reading
 
Eric Payne, a divorced dad and retired marriage & fatherhood blogger, tells the comedic tale of his "Chapter 2" — having to start life over brand new after a divorce he didn't want. What Does Starting Over Mean? Although "free” for the first time in 15 years, Eric has years of baggage and a stubborn desire to hold on to the past which initially keeps him stuck as he tries to move in a world way different than the one where he first met his ex-wife in the year 2000. From one-night stands to g ...
  continue reading
 
“Don’t look to the bottle, the knife, or the gun… Look for the soul you’ll become! Welcome to “Beat The Mental Health Out Of It!”, where humor meets heart—and things get uncomfortably real! Join our fearless host, “The DEFECTIVE Schizoaffective,” a lovable goofball navigating life with Schizoaffective Disorder who boldly asked, “What the hell… why not turn my traumatic experiences into a podcast for the enjoyment of others?” He is often joined by his wise, “elderly” co-host, “IndyPocket,” an ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Not only is masculinity a wilderness, we often feel alone in it. Male loneliness is at epidemic levels which is not only tragic, it correlates to more men seeking commercial sex. Unfortunately, the demand for commercial sex is precisely what drives human trafficking! On this podcast, we discuss aspects of modern masculinity with leaders across various social justice and professional backgrounds so you can increase your tools for navigating the Masculine Wilderness.
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Bringing you vital facts and perspectives on Islamist extremism and how to combat it directly from leading activists in the field. Clarion Podcast is brought to you by Clarion Project, dedicated to challenging Islamist extremism and promoting dialogue with Muslim human rights activists.
  continue reading
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Loading …
Episodes
Series
Episodes
Sort:
Newest
Newest
Oldest
Longest
Shortest
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show series
 
SHADOW SELF 2.0, Y’ALL! Welcome to “Beat The Mental Health Out Of It!” with your hosts, The DEFECTIVE Schizoaffective and IndyPocket! The show where we have candid, unscripted discussions about everything related to mental health with a twist of humor and no-holds-barred! In episode 15, we peeled back the layers of embracing “THE SHADOW SELF.” But …
  continue reading
 
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
  continue reading
 
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022…
  continue reading
 
Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
  continue reading
 
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offer…
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outloo…
  continue reading
 
Victoria Sinis is the founder of Creating Gems, an organization created to help young women break free from harmful narratives about themselves. Victoria used to work for an OnlyFans agency, recruiting creators, curating their social media presence, and managing marketing funnels designed to drive traffic to explicit content. In this episode, she s…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
Welcome to “Beat The Mental Health Out Of It!” with your host, The DEFECTIVE Schizoaffective! The show where I have candid, unscripted discussions about everything related to mental health with a twist of humor and no-holds-barred! He’s back with another SHITTY episode… may we take your order, PREASE? IT’S GUFF, again! Last time Josh graced us with…
  continue reading
 
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configur…
  continue reading
 
In this week's episode, Trevor Holland, Australia New Zealand managing director of Lululemon, discusses the fear of walking away from his passion to start a new career, taking lessons from his favourite audio book Atomic Habits by James Clear, and searching out mentors to guide him through his career. See omnystudio.com/listener for privacy informa…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today’s episode, Chris and Abbie are discussing why change can feel so lonely? They will talk about what triggers growth in people, the amount a person can actually change and how loneliness plays a …
  continue reading
 
SANS Stormcast Monday, May 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE …
  continue reading
 
Enjoying the content? Let us know your feedback! In this week's episode, we get into some detailed exploration of an up and coming malware. Looking at it closer, it is one of the most advanced post-exploitation code families shaping the cybersecurity landscape in 2025. Over the time we have together, we’ll unravel what this malware is, how it works…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2; Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adve…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a “weird string” found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5B…
  continue reading
 
In this explosive episode of Cypher Tech Hacks, host Alex Cipher breaks down the infamous SolarWinds cyberattack—one of the most dangerous supply chain breaches in U.S. history. Learn how elite hackers compromised a trusted software update to infiltrate 18,000 networks, including Fortune 500 companies and U.S. federal agencies. From backdoored buil…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and sho…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
Join us on THE DARK SIDE… …And welcome to “Beat The Mental Health Out Of It!” with your hosts, The DEFECTIVE Schizoaffective and IndyPocket! The show where we have candid, unscripted discussions about everything related to mental health with a twist of humor and no-holds-barred! In what might just be the most eyebrow-raising episode yet, we're divi…
  continue reading
 
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play