Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Accounting Cybersecurity public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Policy & Insights

ACCA Insights

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The latest research and opinion from ACCA’s Professional Insights. We explore the big issues impacting business, the accountancy profession and the evolving world of work. From technology to talent management, our subject matter experts and guests discuss good practice from across industries to help you stay ahead in business and your career.
  continue reading
 
The Successful Bookkeeper Podcast is a weekly show to help increase your confidence, work smarter and build a business you love. Each week you'll listen to inspiring guests who will share their success secrets, so you can take your bookkeeping enterprise and life to another level. Some of them include New York Times Best-Selling Author of E-Myth, Michael E. Gerber, Pure Bookkeeping Co-Founder, Debbie Roberts, the host of The Productive Woman podcast, Laura McClellan and the author of *I Know ...
  continue reading
 
Join Isaac Heller as he meets with leaders in the accounting technology space to discuss how AI and automation are transforming the accounting industry, how technology has evolved, and how AI can help accountants work more efficiently. You’ll also learn how accountants can embrace innovations to improve their careers and lives and get forward-thinking perspectives on where the accounting profession is headed when it comes to new technologies and AI!
  continue reading
 
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
  continue reading
 
Artwork
 
The Home Care Experience with T&A is hosted by Amy Taylor, CPA, and Troy Brooks, Attorney. Together, they bring over 40 years of experience in home care, hospice, and healthcare to the mic. With candid discussions, expert guests, and unfiltered humor, they explore the challenges and triumphs of the caregiving world.
  continue reading
 
Artwork

1
Epik Mellon - the QA Cafe Podcast

Jason Walls, Director of Technical Marketing at QA Cafe

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Epik Mellon is a podcast about networks; the real people and crazy stories behind the amazing fact that the Internet even works. Networking folk are mavericks, adventurers, and nerds all rolled into one. Sponsored by QA Cafe, we discuss how people like us got into the field, the real issues and funny circumstances we've been in, and some real conversations about the state of the industry, technology, and the future of communications. If you ever wanted to know "how the sausage is made" behin ...
  continue reading
 
The Modern Accountant is a podcast for accounting professionals. We discuss the intersection between technology and the accounting industry, covering topics like cloud accounting, automation, cybersecurity, and data privacy. Learn about the latest trends, strategies, and tools to help your firm thrive in today's digital landscape. Tune in to stay ahead in the ever-evolving world of technology.
  continue reading
 
Discover the latest news and trends in cybersecurity and fraud prevention in the Kount 5 Trends, 5 Minutes: Cyber & Fraud podcast. Each week host Lacey Briggs will bring you the top five headlines with insights from industry experts on how to protect your business from eCommerce fraud, payments fraud, bots, account takeover and more. Join us every Thursday.
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
Artwork

1
The Connector.

Koen Vanderhoydonk (The Connector)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Welcome to the connector podcast, an ongoing conversation connecting FinTechs, banks and regulators worldwide. Join CEO and founder Koen Vanderhoydonk as you learn more about the latest available trends and solutions in the markets.
  continue reading
 
Based in South Florida since 2014, Compliance.Network brings a unique and diverse expertise to the financial and regulatory industries. Representing local and international clients throughout Latin America, Compliance.Network is the gateway to the Americas for foreign, financial institutions that have a presence in the U.S. or strive to establish one. When your firm partners with our team of experts, you will be free to dedicate more time and effort to growing your business. You will feel pe ...
  continue reading
 
Join us for a series of insightful and thought-provoking discussions led by technologist and thought leader Chris Westland. In these conversations, Chris tackles a broad spectrum of contemporary technological issues, offering expert analysis on the rapid advancements that are reshaping industries, economies, and society at large. From artificial intelligence to blockchain, cybersecurity, and the ethical dilemmas posed by emerging technologies, Chris Westland brings a scholarly yet accessible ...
  continue reading
 
Artwork

1
Beyond Wealth: Success Unscripted

Matt Calnan - Beyond Wealth

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Dive into ’Beyond Wealth: Success Unscripted,’ where host Matt Calnan takes you behind the scenes of financial success to explore the real stories of personal and professional triumph. This podcast isn’t just about the balance in your bank account; it’s about the journey, the decisions, and the strategies that lead to meaningful achievements. Each episode features candid conversations with successful Southern Albertans who share the highs and lows of their journey, offering insights into the ...
  continue reading
 
Artwork

1
#shifthappens in the Digital Workplace Podcast

Dux Raymond Sy and Mario Carvajal

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Accelerate your business transformation with the #shifthappens podcast. Hosts Dux Raymond Sy and Mario Carvajal explores real-life case studies, interviews industry leaders, and highlights the latest trends in the digital workplace. Whether you're a CEO, tech enthusiast, or just curious, tune in to unlock the full potential digital transformation offers. Get inspired to make the shift happen, adapt to shifts around you, and prepare for the future. Don't miss out - join us now!
  continue reading
 
Artwork
 
The Center for AI Policy Podcast zooms into the strategic landscape of AI and unpacks its implications for US policy. This podcast is a publication from the Center for AI Policy (CAIP), a nonpartisan research organization dedicated to mitigating the catastrophic risks of AI through policy development and advocacy. Based in Washington, DC, CAIP works to ensure AI is developed and implemented with effective safety standards.
  continue reading
 
Information Technology is vital to our daily life... personal, education, business, spiritual to name a few. Using this platform and others listed below, I aim to make information technology a relatable topic and reinforce the value Information Technology adds to our lives. On a weekly basis, I will discuss various information technology uses, opportunities, issues and news with you, my valued listeners. These topics will take into account old, present and new technology as part of the conve ...
  continue reading
 
Manufacturers are the driving force behind Industry 4.0, and Wipfli is here to help. Join Bryan Powrozek, engineer turned CPA, as he interviews industry influencers and discusses everything from operational improvements and performance enhancements to large-scale digital transformation and data-based decision making. If you want innovative ideas for growth and automation, The Sound of Automation is for you.
  continue reading
 
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
  continue reading
 
Artwork

1
askClever over Coffee

John Marino with co-host ChatGPT

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"askClever over Coffee - How AI Built This" is an innovative podcast channel where co-hosts John Marino and ChatGPT invite leaders to share insights on the transformative power of AI within their industries. Through engaging conversations, the show explores the cutting-edge advancements and challenges of integrating AI technologies. Tune in to gain a unique perspective on how AI is reshaping various industries, and follow us for more updates on askclever.ai, Instagram (@askclever), Facebook ...
  continue reading
 
Artwork

1
Path to Abundant Living

Scott Morrison and Matt Nordmann

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Path to Abundant Living, where we address pertinent topics surrounding wealth management to help better position yourself, your family, and your business for success. Listen as Scott Morrison and Matt Nordmann, Managing Partners of Morrison, Nordmann & Associates, tap into their wealth of financial experience and address various strategies and services they utilize for their clients. So sit back, relax, and enjoy intriguing financial conversations that place you on path to abundan ...
  continue reading
 
Artwork

1
The Cyber Queens Podcast

Maril Vernon, Erika Eakins, and Amber Devilbiss

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
  continue reading
 
Artwork
 
Got Conflict? Let’s Talk Peacebuilding is a podcast by the Alliance for Peacebuilding (AfP), a network of more than 225 organizations working globally in 181 countries to reduce and prevent violent conflict and build sustainable peace. Got conflict? Of course we do! Because conflict is inevitable, but violent conflict is not. In this podcast, we discuss what is driving record-breaking global violent conflict, and more importantly, what we can do to prevent and reduce violent conflict and bui ...
  continue reading
 
Loading …
show series
 
Demi Ben-Ari, CTO and Co-founder of Panoways, breaks down the critical cybersecurity concerns for finance professionals, from third-party risk management to AI security implications. Drawing from his background in the Israeli Air Force and maritime analytics, Demi explains how companies can build effective cybersecurity programs and why firms shoul…
  continue reading
 
As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
🎙️ SAP Zero-Day, Nova Scotia Energy Provider Offline, SK Telecom Response, Leaked Git Secrets & Tokens 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 902: Today’s episode will discuss the latest news as SAP ZeroDay Exploit more news below: · France Blames Russia for Cyberattacks · …
  continue reading
 
The financial landscape is undergoing dramatic transformation. From Asia's strategic pivot toward Europe to revolutionary approaches in fighting financial crime, every aspect of finance is being reimagined through technology. At the heart of this evolution is a fascinating shift in global financial partnerships. Asian institutions are increasingly …
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
In our debut episode of Beyond Downtime: The Verito Advantage, we take you back to Thomson Reuters SYNERGY 2024, where industry leaders gathered to discuss the future of tax and accounting technology. Recorded live at last year’s event, this conversation is packed with more relevant insights than ever, from preparing your firm for the FTC Safeguard…
  continue reading
 
“Just start small. Just start doing it. It'll take a while, most likely to kind of build. So start even before you feel like a hundred percent ready. Just start. It's a lot of it the first year or so, it's just like kind of practice too.” -Morgan Law Morgan Law, founder of Fine Points Bookkeeping and a popular YouTuber, shares how she transitioned …
  continue reading
 
Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠ Audio reference link: ⁠“What Is the Elvish Word for Friend?”⁠ Quora, 2021.…
  continue reading
 
Ever wondered who's looking out for your finances when you can't? In this eye-opening episode, we dive deep into the world of trusted contacts - the unsung heroes of financial protection that every investor should know about. The trusted contact serves as a crucial safeguard against exploitation, particularly for vulnerable populations. Unlike bene…
  continue reading
 
Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠⁠ Audio reference link: ⁠⁠“What Is the Elvish Word for Friend?”⁠⁠ Quora, 2021. Learn more about your ad choices. Visit me…
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
Charles Stanton and Kira Kramer discuss the lack of due process in immigrant removals, highlighting a case where a man was deported to El Salvador without any process. They express concern over the shift towards competitive authoritarianism, citing a survey of 500 political scientists. The conversation touches on the importance of affirmative actio…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
Host Anne-Marie Henson sits down with Paul Dostaler, BDO’s Partner and National Manufacturing and Distribution Leader, to unpack how manufacturers can move beyond pilots and start scaling AI effectively. They explore the current pace of AI adoption in Canada, the roadblocks many businesses face, and what’s needed to realize long-term ROI. The episo…
  continue reading
 
The Managed Service Provider (MSP) industry is undergoing a major shift as AI, automation, and cybersecurity redefine business operations. In this #shifthappens episode, Jorn Wittendorp, Founder of Ydentic, and Mario Carvajal, Chief Strategy and Marketing Officer at AvePoint, discuss the Ydentic-AvePoint acquisition, the trends affecting the indust…
  continue reading
 
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
In this episode of The Home Care Experience with T&A, hosts Amy Taylor and Troy Brooks welcome guest Denise Bell—former home care agency owner, skincare brand founder, and bold advocate for personal growth. From Kodak cubicles in the '80s to Grammy swag bags in 2024, Denise walks us through her transformative journey through entrepreneurship, burno…
  continue reading
 
🎙️ Mark & Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 901: Today’s episode will discuss the latest news as Mark & Spencer CyberAttack more news below: · Baltimore public school ransomware · Cookie Bi…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
🎙️ Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 900: Today’s episode will discuss the latest news as Japan Trading Account Hack more news below: · Abilene, TX Cyberattack…
  continue reading
 
Richard Jackson, AI Assurance Leader at Ernst & Young, discusses how artificial intelligence is transforming the accounting profession after 130 years of tradition. Drawing from his Silicon Valley experience, Jackson explores the ethical implementation of AI in financial operations, emphasizing that organizations can only innovate as fast as their …
  continue reading
 
“By offering corporate services, compliance services, payroll and sales tax registration services to their clients, they're actually not only enhancing their trusted advisory services, but they're also scaling their revenues, increasing their revenues. More importantly, they are keeping that client with them long term because they're becoming a one…
  continue reading
 
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
  continue reading
 
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
Charles Stanton and Kira Kramer discuss the threat to educational institutions and the erosion of legal principles. They highlight the impact of government pressure on universities, citing the University of Michigan's abandonment of DEI programs. Stanton criticizes law firms for succumbing to government dictates on case selection, undermining socia…
  continue reading
 
🎙️ Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patch 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 899: Today’s episode will discuss the latest news as Hertz Cleo Data Breach more news below: · Ahold Delhaize USA Ransomware · China Targets R…
  continue reading
 
Bridging the gap between innovative fintech solutions and traditional banking, QRED Bank is rewriting the rules for SME financing across Europe. In this revealing conversation with Norway Country Manager Kristina, we explore how QRED transformed from an ambitious startup into a fully-licensed bank without losing its entrepreneurial spirit or custom…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. President Trump’s newly escalated tariffs may be aimed at economic revival, but they’re also triggering a supply‑chain shake‑up that will redefine cybersecurit…
  continue reading
 
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
  continue reading
 
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
  continue reading
 
Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm In this eye-opening episode, James Azar dissects the unsustainable rise of cybercrime—now at six trillion dollars—and demands a radical approach to defending our digital frontier. He breaks down the pitfalls of outdated technology, the shortcomings of regulatory efforts, an…
  continue reading
 
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
  continue reading
 
James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. This gripping episode dives deep into the human toll of cyber threats—revealing how platforms can become breeding grounds for sextortion, trafficking, and child abuse, all while shining a spotlight on cybersecurity expert Pau…
  continue reading
 
“Go out, stick your hand out, say hello and start talking. It's not easy, but over time it becomes easier and it's definitely worthwhile just creating the relationships either virtually or physically in the community.” -Holly Corcoran Holly Corcoran, owner and CEO of Corcoran Business Advisory Services, shares her journey from running a traditional…
  continue reading
 
This episode discusses the Ivy Business School's leader character framework, emphasising the importance of character in leadership and risk management and how elevating character to the same level as competence and commitment can ensure better decision-making and financial oversight, especially during such uncertain times. Dr Mary Crossan explains …
  continue reading
 
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
  continue reading
 
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
  continue reading
 
xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
  continue reading
 
Charles Stanton and Kira Kramer discuss the erosion of U.S. cybersecurity due to the removal of experienced personnel, which they argue poses a significant threat to national security. They also critique the administration's tariff policies, predicting they will harm the car industry and increase production costs by 20-40%. Kramer highlights the ex…
  continue reading
 
James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. In this episode, we explore how Agentic AI—autonomous, decision-making artificial intelligence—is reshaping cybersecurity and business operations at lightning speed. From thwarting ransomware in seconds to handling customer i…
  continue reading
 
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
🎙️ Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 895: Today’s episode will discuss the latest news as Oracle Now Denies Cloud Breach more news below: · Sensata Disrupted by Ransomwar…
  continue reading
 
Loading …
Listen to this show while you explore
Play