Welcome to the inside track of cybersecurity entrepreneurship. We bring you the best founders, operators, and investors building the future of cybersecurity.
…
continue reading
Cato Networks Podcasts
The DLLS Mavericks Podcast delivers the most complete coverage of the Dallas Mavericks, five days a week. Featuring insider reporting from Tim Cato and Marc Stein, plus expert on-court analysis from Kevin Gray Jr. and Bobby Karalla, the show brings you everything from breaking Mavs news and trade rumors to in-depth game breakdowns, player performances, and league-wide insights. Whether it’s Kyrie Irving’s latest highlight, Anthony Davis' impact, or what’s next for the Mavs in the West, you’l ...
…
continue reading
Home of the Cloud Unfiltered Podcast cloudunfiltered.substack.com
…
continue reading
Dive into the dynamic world of the energy industry with The Energy Essentials Podcast. Each episode explores a unique aspect of the sector, featuring in-depth discussions led by seasoned market experts. Brought to you by Cornwall Insight, a pre-eminent provider of research, analysis, consulting, and training for businesses and stakeholders engaged in the energy markets of Great Britain and Ireland.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading

1
Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—a milestone that cements its place as one of the most formidable players in the rapidly expanding Secure Access Service Edge (SASE) market. In this episode, we unpack what this massive investment means…
…
continue reading

1
First Impressions of Cooper Flagg, Ryan Nembhard, & The Mavericks | DLLS Mavs Podcast
1:00:08
1:00:08
Play later
Play later
Lists
Like
Liked
1:00:08📬 Dallas sports in your inbox! https://alldlls.com/newsletter Fresh off his standout summer league performance, Ryan Nembhard joins the DLLS Mavs crew live in Vegas! Plus, the Dallas Morning News’ Mike Curtis and Mavs Moneyball’s Kirk Henderson break down Cooper Flagg’s debut, Ryan Nembhard’s impressive first game with the Mavericks, and more! An A…
…
continue reading

1
TikTok, China, and the EU: The Battle Over Data Sovereignty
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protecti…
…
continue reading

1
Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal…
…
continue reading

1
WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause an…
…
continue reading

1
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
…
continue reading

1
Cooper Flagg And Ryan Nembhard Lead Mavs To WIN vs. Lakers | DLLS Mavs Postgame
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33📬 Dallas sports in your inbox! https://alldlls.com/newsletter Cooper Flagg might not have shot it great, but he and the Dallas Mavericks won their first Summer League nonetheless, 87-85 against Bronny James and the LA Lakers. Ryan Nembhard scored the team’s final five points in crunch time to help lead them to a come-from-behind victory down the st…
…
continue reading

1
It’s Flagg Day! Cooper Flagg & The Summer Mavs Play TONIGHT | DLLS Mavs Podcast
59:28
59:28
Play later
Play later
Lists
Like
Liked
59:28📬 Dallas sports in your inbox! https://alldlls.com/newsletter The DLLS Mavs crew is in Las Vegas for NBA Summer League, bringing you coverage of Cooper Flagg, Ryan Nembhard, Miles Kelly, Melvin Ajinca, and the Dallas Mavericks. Today they’re joined by ESPN’s Tim MacMahon to preview Flagg’s first unofficial game as a Maverick and discuss some of the…
…
continue reading

1
Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service …
…
continue reading

1
Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In this episode, we examine Taiwan’s growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern over data privacy and foreign surveillance. A recent inspection by Taiwan’s National Security Bureau (NSB) revealed that these apps aggressively collect personal data and transmit it to servers located…
…
continue reading

1
The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00This episode exposes the growing menace of Atomic macOS Stealer (AMOS) — a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS users worldwide. Once seen as a simple data stealer, AMOS has matured into a potent, long-term threat featuring keyloggers, a persistent backdoor, and system-level access, all designed to exfiltrate data a…
…
continue reading

1
CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this episode, we dissect CitrixBleed 2—a newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway appliances. Tracked as CVE-2025-5777 (and possibly also CVE-2025-6543), this critical flaw mirrors the notorious original CitrixBleed by allowing attackers to extract sensitive memory content, including user se…
…
continue reading

1
Cooper Flagg & The Mavericks Gear Up For Summer League | DLLS Mavs Podcast
59:46
59:46
Play later
Play later
Lists
Like
Liked
59:46📬 Dallas sports in your inbox! https://alldlls.com/newsletter The Dallas Mavericks and rookie sensation Cooper Flagg are practicing ahead of this week’s Summer League in Las Vegas. He spoke with the media today about his work in Dallas so far and what he wants to improve on. The DLLS Mavs crew react to his comments and discuss Flagg and the rest of…
…
continue reading

1
SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applications. With 27 new and 4 updated security notes released, including seven rated as critical, this patch cycle directly targets some of the most serious vulnerabilities seen in SAP environments in recent mem…
…
continue reading

1
106GB Exposed? Telefónica, HellCat, and the Silent Data Breach
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
…
continue reading

1
Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
…
continue reading

1
Kyrie Irving Might Miss More Time Than We’re Hoping For | DLLS Mavs Podcast
59:34
59:34
Play later
Play later
Lists
Like
Liked
59:34📬 Dallas sports in your inbox! https://alldlls.com/newsletter Video surfaced over the weekend of Kyrie Irving saying there’s no guarantee he’d be able to return even by the playoffs, if the Mavs make it that far. The superstar said it about a month ago, but that’s still notable because media have said he could return as early as January. The DLLS M…
…
continue reading

1
The Illusion of Shutdowns: What Hunters International's Closure Really Means
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
…
continue reading

1
CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
…
continue reading

1
ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated cri…
…
continue reading

1
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
…
continue reading

1
The Dallas Mavericks Have Quietly Had A Great Offseason
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49MAKE YOUR MOVE DIEHARD SALE: JUST $36 FOR YEAR 1! https://alldlls.com/intro-offer-youtube The Dallas Mavericks' offseason is off to a terrific start. They've drafted Cooper Flagg, signed Kyrie Irving and Daniel Gafford to team-friendly contracts, signed D'Angelo Russell to the mid-level exception, and reportedly have agreed to bring back Dante Exum…
…
continue reading

1
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
…
continue reading

1
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
…
continue reading

1
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
…
continue reading

1
Could LeBron James ACTUALLY Join The Dallas Mavericks? | DLLS Mavs Podcast
1:00:27
1:00:27
Play later
Play later
Lists
Like
Liked
1:00:27MAKE YOUR MOVE DIEHARD SALE: JUST $36 FOR YEAR 1! https://alldlls.com/intro-offer-youtube Is LeBron James about to join the Dallas Mavericks? Let’s get weird. The DLLS Mavs crew breaks down how it could happen and why it would make sense. Plus Marc Stein joins the show to provide further insight and reporting on the addition of Frank Vogel to the c…
…
continue reading

1
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
…
continue reading

1
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
1:08:04
1:08:04
Play later
Play later
Lists
Like
Liked
1:08:04In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
…
continue reading

1
FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
…
continue reading

1
BREAKING: Dallas Mavericks To Re-Sign Dante Exum | DLLS Mavs Podcast
14:31
14:31
Play later
Play later
Lists
Like
Liked
14:31MAKE YOUR MOVE DIEHARD SALE: JUST $36 FOR YEAR 1! https://alldlls.com/intro-offer-youtube The Dallas Mavericks and Dante Exum have agreed to a one-year contract, according to ESPN's Shams Charania. The DLLS Mavs crew reacts to the news and analyzes Exum's fit on the team, including how the Mavs are creating the roster space for him. An ALLCITY Netw…
…
continue reading

1
Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and althou…
…
continue reading

1
How Good Can The Mavericks Defense Be Next Season? | DLLS Mavs Podcast
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51MAKE YOUR MOVE DIEHARD SALE: JUST $36 FOR YEAR 1! https://alldlls.com/intro-offer-youtube The Dallas Mavericks have probably the best interior defense in the NBA. How good can the team be on that end of the floor in 2025-26? The DLLS Mavs crew explores that question by evaluating the current roster’s strengths and weaknesses, and then comparing the…
…
continue reading

1
Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authe…
…
continue reading

1
Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates…
…
continue reading

1
Berlin Regulator Targets DeepSeek AI Over Data Transfers to China
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting that Google and Apple remove the DeepSeek AI application from their app stores. The move stems from allegations that DeepSeek, a Chinese-developed generative AI platform, violates the EU’s General Data Pro…
…
continue reading

1
CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks
56:41
56:41
Play later
Play later
Lists
Like
Liked
56:41The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appli…
…
continue reading

1
The BEST-CASE Scenario For D’Angelo Russell And The Mavericks | DLLS Mavs Podcast
59:30
59:30
Play later
Play later
Lists
Like
Liked
59:30📬 Dallas sports in your inbox! https://alldlls.com/newsletter Former All-Star guard D’Angelo Russell agreed to a two-year deal with the Dallas Mavericks. The Mavs believe D-Lo can hold things down until Kyrie Irving returns from his torn ACL injury. On today’s show the DLLS Mavs crew take an optimistic approach and consider what the best-case scena…
…
continue reading

1
Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks
54:24
54:24
Play later
Play later
Lists
Like
Liked
54:24A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode dives into the technical details, real-world impact, and broader implications of this actively exploited flaw. Tracked as a type confusion bug in Chrome’s V8 JavaScript engine, the vulnerability allows attac…
…
continue reading

1
BREAKING: Dallas Mavericks To Sign D'Angelo Russell To 2-Yr, $12 Million Deal | DLLS Mavs Podcast
34:22
34:22
Play later
Play later
Lists
Like
Liked
34:22📬 Dallas sports in your inbox! https://alldlls.com/newsletter The Dallas Mavericks and D'Angelo Russell have reportedly agreed to a two-year, $12 million deal, according to media reports. The DLLS Mavs crew reacts to the news and breaks down the impact D-Lo could have on the roster. An ALLCITY Network Production SUBSCRIBE: https://www.youtube.com/@…
…
continue reading

1
Dallas Mavericks NBA Free Agency LIVE Reactions | DLLS Mavs Podcast
1:04:38
1:04:38
Play later
Play later
Lists
Like
Liked
1:04:38📬 Dallas sports in your inbox! https://alldlls.com/newsletter **EDITOR'S NOTE. This was recorded before the news broke that D’Angelo Russell will sign with the Mavs. That will be discussed in a podcast coming later tonight.** Join the DLLS Mavs crew live as they react to every single move from the first hour of free agency, all through a Mavs lens.…
…
continue reading

1
Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
1:45:31
1:45:31
Play later
Play later
Lists
Like
Liked
1:45:31Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
…
continue reading

1
Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting …
…
continue reading

1
Why Canada Banned Hikvision: National Security vs. Geopolitics
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector…
…
continue reading

1
Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving…
…
continue reading

1
Joe Levy: Scaling Sophos to $1B+ revenue and defending the 350M overlooked businesses
1:05:03
1:05:03
Play later
Play later
Lists
Like
Liked
1:05:03In this episode of Inside the Network, we sit down with Joe Levy, CEO of Sophos, a 40-year-old cybersecurity company that has quietly become one of the most important global players, serving over 600,000 organizations and generating over $1 billion in revenue. Throughout his career, Joe has operated with a founder's mindset: thinking in bets, build…
…
continue reading

1
Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patte…
…
continue reading

1
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
…
continue reading

1
Cooper Flagg Feels ‘Blessed’ And ‘Grateful’ To Join The Dallas Mavericks | DLLS Mavs Podcast
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19NBA & NHL DRAFT DIEHARD SALE: JUST $36 FOR YEAR 1! https://alldlls.com/intro-offer-youtube The Dallas Mavericks officially introduced No. 1 pick Cooper Flagg to local media today. The DLLS Mavs crew reacts to the press conference and Flagg’s statements, before diving into analysis of Ryan Nembhard, who reportedly agreed to a two-way contract with t…
…
continue reading

1
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject …
…
continue reading

1
CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure flaw allows unauthenticated attackers to extract session tokens directly from device memory — enabling session hijacking and even bypassing multi-factor…
…
continue reading