Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Google Cloud Platform Podcasts
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Cloud Wars analyzes the major cloud vendors from the perspective of business customers. In Cloud Wars Live, Bob Evans talks with both sides about these profoundly transformative technologies, and with monthly All-Star guests from across the business community about the trends impacting how the world lives, works, plays, and dreams. Visit https://cloudwars.com for more.
…
continue reading
Each week, Jon Shanks, CEO of cloud-native consultancy and product business Appvia, and tech evangelist Lewis Marshall, senior developer and AI enthusiast, analyse the biggest news stories that week, that are shaping Cloud, Data and AI. Alongside their insight, they invite frontline leaders, Chief Technology Officers and engineering heads from established, cloud-powered organisations to share candid lessons from running real-world workloads at scale. Together, they take the headlines and get ...
…
continue reading
Short educational content about Google Cloud Platform (GCP)
…
continue reading
The Google Cloud Platform Podcast, coming to you every week. Discussing everything on Google Cloud Platform from App Engine to BigQuery.
…
continue reading
Designed & engineered specifically for Dental Practices. Adit is the only dental software that integrates Calls, Texts, Emails, Patient Forms, Online Scheduling, Analytics, Reviews, Payments and more, all in one place! These features are all manageable within Adit's centralized platform, along with detailed insights on all marketing campaigns – Google Ads, social media marketing, or even billboards and flyers. https://www.adit.com
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
The Marketing Intelligence Show is all about empowering marketing leaders to work better with data and make sure every marketing dollar counts. On this podcast, you'll learn from Supermetrics' experts on how you can use data to fuel growth and maximize the ROI of your marketing spend. Our goal is to give you the insights and knowledge to turn your raw marketing data into business growth. This podcast is brought to you by Supermetrics, the marketing data intelligence platform used by more tha ...
…
continue reading
Where Technology Meets the Real World
…
continue reading

1
CGX Cast (A Cloud Gaming Podcast) Stadia, Geforce Now, Amazon Luna, xCloud, Shadow PC
Cloud Gaming Xtreme
Welcome to the Cloud Gaming Xtreme Podcast. In this podcast, We Cover every Cloud Gaming Platform. Platforms such as Nvidia Geforce Now, Microsoft Project Xcloud, Shadow, and Google Stadia. We talk about the recent news and discussions in the cloud gaming universe. We have 7 awesome members on the panel who are passionate about cloud gaming. This podcast goes live on youtube every Saturday afternoons at 2 pm PT. You can check out our youtube channel at https://www.youtube.com/CloudGamingXtre ...
…
continue reading
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Netenrich invites security professionals to learn how they can optimize their security operations, remove silos, and gain increased efficiencies with the tools and systems they have. This podcast series is focused on effective detection, investigation, and response techniques where data and analytics is at the foundation. Hear from leading cybersecurity experts on how they’re transforming security ops. Netenrich boosts security and digital operations effectiveness so that organizations can a ...
…
continue reading
A podcast about web design and development.
…
continue reading
Untold Stories is a new podcast started from January 2022, which is cohosted by two hosts Chabi Dhakal from Ontario, Canada and Sagar Dangal from Michigan, USA. The main goal of the Podcast is to create a platform to have a casual and raw conversation with various personalities from different field such as Business, Sports, Community Services, Education, Entertainment, etc. We hope to provide value to our listeners through our guest’s untold stories, experiences, perspectives, and opinions. ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
The RecruitingDaily Podcast is a series of conversations and interviews with thought leaders and practitioners. Each week, the topic digs into the biggest challenges faced in HR, recruiting, and the latest technology innovations you should know about. Listen & Subscribe on your favorite platform Apple | Spotify | Google | Amazon
…
continue reading
Find me on Github/Twitter/Kaggle @SamDeepLearning. Find me on LinkedIn @SamPutnam. This Podcast is supported by Enterprise Deep Learning | Cambridge/Boston | New York City | Hanover, NH | http://www.EnterpriseDeepLearning.com. Contact: [email protected], 802-299-1240, P.O. Box 863, Hanover, NH, USA, 03755. We move deep learning to production. I teach the worldwide Deploying Deep Learning Masterclass at http://www.DeepLearningConf.com in NYC regularly and am a Deep Learning Consultant ser ...
…
continue reading
Interchange is about integrated transport infrastructure as the solution to achieving a more effective and decarbonised transport network. The Interchange podcast is a monthly show, produced in association with Arcadis https://www.arcadis.com/en Hosted by Ayo Abbas, the show will drill down into the challenges, the opportunities and the economic, environmental and societal benefits we could gain by having a low carbon, seamless, and fully integrated transport system that works. Each month we ...
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading

1
OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS
1:18:25
1:18:25
Play later
Play later
Lists
Like
Liked
1:18:25A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The campaign, attributed to an unknown but likely state-affiliated actor, leverages Microsoft's ClickOnce deployment technology to deliver custom Golang-b…
…
continue reading

1
Central Kentucky Radiology’s 2024 Data Breach Affects 167,000
51:40
51:40
Play later
Play later
Lists
Like
Liked
51:40In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s systems over a two-day period, compromising sensitive data for approximately 167,000 individuals. The stolen information includes names, Social Security n…
…
continue reading

1
Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data
1:09:30
1:09:30
Play later
Play later
Lists
Like
Liked
1:09:30In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed funding. The company’s mission is bold and timely: to secure content generated by both humans and AI across modern SaaS ecosystems — including high-ris…
…
continue reading

1
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10.0. These flaws—CVE-2025-20281 and CVE-2025-20282—allow unauthenticated remote attackers to execute arbitrary commands on the underlying operating syst…
…
continue reading

1
How AI is changing search — and what that means for SEO and content
31:25
31:25
Play later
Play later
Lists
Like
Liked
31:25Is your SEO strategy ready for the age of AI? In this episode of The Marketing Intelligence Show, host Fanny sits down with Heini Lindfors, Supermetrics' in-house SEO expert, to dissect the monumental shifts in search, from Google's AI Overviews to the rise of conversational search with tools like ChatGPT and the unexpected emergence of TikTok as a…
…
continue reading

1
U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This move places WhatsApp alongside other restricted applications like TikTok, ChatGPT, and Microsoft Copilot, reflecting an intensifying government focus on digital security and the reliability of consum…
…
continue reading

1
How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Select Medical Holdings. In April 2024, Mainline Health experienced a direct ransomware attack by the Inc Ransom group, compromising sensitive data for over 101,000 individuals. Select Medical’s breach, …
…
continue reading

1
Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike
41:20
41:20
Play later
Play later
Lists
Like
Liked
41:20Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly, targeting both Windows and Linux systems across the globe. Originally designed for cryptocurrency mining, Prometei has expanded its capabilities to in…
…
continue reading

1
The Siemens-Microsoft Antivirus Dilemma Threatening OT Security
1:23:55
1:23:55
Play later
Play later
Lists
Like
Liked
1:23:55This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an "alert only" mode in Defender has created a significant operational risk for plants running Siemens’ systems. Without this functionality, operators must choose between ignoring potential malware detect…
…
continue reading
This week, we try a shorter format inspired by the Dithering podcast. The conversation digs into the difference between apps built with AI from the ground up and those with AI bolted on after the fact. Watch the YouTube Live Recording of Episode 525 Rundown Format inspired by Dithering An Interview with Cursor Co-Founder and CEO Michael Truell SDT …
…
continue reading

1
SE Radio 674: Vilhelm von Ehrenheim on Autonomous Testing
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49Vilhelm von Ehrenheim, co-founder and chief AI officer of QA.tech, speaks with SE Radio's Brijesh Ammanath about autonomous testing. The discussion starts by covering the fundamentals, and how testing has evolved from manual to automated to now autonomous. Vilhelm then deep dives into the details of autonomous testing and the role of agents in auto…
…
continue reading

1
Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million. We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabil…
…
continue reading

1
NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a critical briefing on the evolving landscape of these attacks, with a spotlight on the novel “Echo Chamber” technique discovered by NeuralTrust. Echo Cham…
…
continue reading

1
NB532: HPE Deploys AI Agents Into GreenLake; Wi-Fi 7 Drives Q1 Switch Sales
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Take a Network Break! Our Red Alert is a remote code execution vulnerability in Roundcube. On the news front, HPE announces GreenLake Intelligence, which will bring agentic AI capabilities to the HPE portfolio, Pure Storage brings cloud-like operations for on-prem storage, and Juniper Networks adds predictive analytics to its data center ops platfo…
…
continue reading

1
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, also known as RedMike, Earth Estries, FamousSparrow, GhostEmperor, and UNC2286. Backed by China’s Ministry of State Security (MSS), this group has been running extensive cyber espionage operations since at…
…
continue reading

1
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard. Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Appl…
…
continue reading

1
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime landscape in 2025. Qilin, also known as Agenda, burst onto the scene in 2022 with a Go-based ransomware. It has since evolved into a highly evasive Rust-b…
…
continue reading

1
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by explo…
…
continue reading

1
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry. On June 12, Aflac detected suspicious activity within its U.S. network—a breach attributed to a highly organized cybercrime group and part of a larger…
…
continue reading

1
The Nucor Cyberattack: How Ransomware Threatens American Steel
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical link in the nation’s industrial supply chain. In this episode, we take an in-depth look at the Nucor attack: how cybercriminals targeted operational tec…
…
continue reading

1
670: Brad and Ian Frost on Their New Design Tokens Course
1:08:26
1:08:26
Play later
Play later
Lists
Like
Liked
1:08:26Show Description Brad and Ian stop by to chat about their new course, The Complete Guide to Design Tokens, what happens if you don't use design tokens on projects, what the ideal outcome is for building and designing with design tokens, how many colors is enough, what about refactoring, and does Figma or code win the argument? Listen on Website → G…
…
continue reading

1
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:32A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the mechanics, methods, and forensics that made this possible—and how a sprawling network of scams, labor compounds, and fake identities in Southeast Asia u…
…
continue reading

1
Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43Ransomware groups are no longer just encrypting data — they're going straight for the backups. And if those backups aren’t properly protected, recovery becomes impossible, and ransom payouts more likely. In this episode, we dive deep into how threat actors are exploiting critical vulnerabilities in widely used backup systems, focusing on the recent…
…
continue reading

1
Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37Ransomware just bankrupted a 100-year-old manufacturer—and the world should take notice. In this episode, we dissect the cyberattack that brought down Fasana, a German paper napkin producer, and pushed it into insolvency. On May 19, 2025, employees arrived to find printers ejecting extortion notes. By the end of the week, systems were paralyzed, €2…
…
continue reading

1
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most of them exfiltrated by infostealer malware. We dive into how this happened: from the malware-as-a-service (MaaS) model enabling even low-skill threat actors to deploy powerful stealers, to how credenti…
…
continue reading

1
Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17A malware distribution network hiding in plain sight — on GitHub. This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Service (DaaS) infrastructure run by a threat actor known as Stargazer Goblin. Using over 3,000 GitHub accounts, this operation pushes dangerous information-stealing malware disguised as legitimate game mo…
…
continue reading

1
Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22A single vendor was compromised — and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a textbook example of how fragile the digital supply chain has become. This episode dissects the breach that exposed names, roles, phone numbers, even CEO contact details of over 137,000 UBS employees, and …
…
continue reading

1
Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaigns: Water Curse and Banana Squad — both targeting developers, red teams, and security professionals through poisoned open-source projects. Water Curse, a financially motivated group, used at least 76 …
…
continue reading

1
Oxford City Council Breach Exposes 21 Years of Data
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51State and local governments are under cyber siege. In this episode, we break down how and why these public institutions have become top targets for attackers — and why the threats are getting worse. Digitization is expanding public access to services, but it's also opening new doors for threat actors. Many local authorities still rely on legacy IT …
…
continue reading
This week, we cover Apple’s WWDC updates—from containerization to Foundation Models—and the Linux Foundation’s new FAIR Package Manager. Plus, we crown the best SDT Uber rider. Watch the YouTube Live Recording of Episode 524 Runner-up Titles Infinite Workday. No more Eudora Revealed productivity. I threw up a tarp over my desk. We agreed to not tal…
…
continue reading

1
Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Two newly disclosed critical vulnerabilities—CVE-2025-5349 and CVE-2025-5777—have put Citrix NetScaler ADC and Gateway deployments at serious risk, exposing enterprise environments to potential data breaches and service disruptions. These flaws underscore the persistent challenges facing infrastructure teams, especially when balancing security patc…
…
continue reading

1
GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Google’s Gerrit code review system—one that could have enabled attackers to infiltrate 18 of Google’s most widely used open-source projects, including Chromium, ChromiumOS, Dart, and Bazel. This episode breaks down how the vulnerability wa…
…
continue reading

1
Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilities—and the implications are serious. Cisco’s firmware flaws impact Meraki MX and Z Series devices running AnyConnect VPN. A bug in the SSL VPN process allows authenticated attackers to crash the VPN server, causing repeated d…
…
continue reading

1
Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51A deep dive into one of the most aggressive ransomware groups operating today—Play—and their latest high-profile target: Krispy Kreme. Operating since 2022, the Play ransomware group has become notorious for its double extortion model, where sensitive data is exfiltrated before systems are encrypted. Victims are pressured not just by digital ransom…
…
continue reading

1
Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57Balazs Molnar, CEO and co-founder of Rabbit, chats with Kieron Allen about the evolving challenges of cloud cost management and how engineering teams have become central to tackling them. He explains why traditional FinOps tools fall short, how Rabbit dives below the surface to uncover hidden waste (especially in platforms like BigQuery) and why au…
…
continue reading

1
SE Radio 673: Abhinav Kimothi on Retrieval-Augmented Generation
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55In this episode of Software Engineering Radio, Abhinav Kimothi sits down with host Priyanka Raghavan to explore retrieval-augmented generation (RAG), drawing insights from Abhinav's book, A Simple Guide to Retrieval-Augmented Generation. The conversation begins with an introduction to key concepts, including large language models (LLMs), context wi…
…
continue reading

1
Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in May 2020. With over €250 million ($290 million) in drug transactions, more than 600,000 users, and 17,000 listings, Archetyp wasn’t just another darknet forum—it was the largest dedicated drug market on…
…
continue reading

1
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare software provider. On April 1st, 2025, threat actors from the KillSec ransomware group exploited CVE-2024-41197 — a critical authentication bypass in Ocuco’s INVCLIENT.EXE — to gain Administrator-level a…
…
continue reading

1
DragonForce Ransomware: The Evolving Threat to Healthcare Data
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to increasingly devastating breaches. We begin with a close look at the rise of Ransomware-as-a-Service (RaaS), focusing on DragonForce, a ransomware group that has transitioned from politically motivated at…
…
continue reading

1
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity unicorn—and why this isn’t just another tech deal. At the core is the U.S. Department of Justice's antitrust investigation, triggered by concerns that the deal could tighten Google’s grip on a critical secto…
…
continue reading

1
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
1:03:42
1:03:42
Play later
Play later
Lists
Like
Liked
1:03:42In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) software actively leveraged by ransomware operators since early 2025. This isn't just a theoretical risk—it's already being used to compromise utility billing providers and downstream MSP customers…
…
continue reading

1
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked by Proofpoint, this campaign began in December 2024 and has since escalated, leveraging TeamFiltration, a legitimate penetration testing tool, to enumerate users and launch password spraying attacks tha…
…
continue reading

1
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows. We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a n…
…
continue reading

1
NB531: Cisco Spotlights AI, Unified Management at CLUS; Ultra Ethernet 1.0 Unveiled
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
…
continue reading