Artwork
iconShare
 
Manage episode 520073437 series 3702279
Content provided by Infosec.Watch. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Infosec.Watch or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Here’s what we cover in Episode 112:

  • Actively Exploited Windows Kernel 0-Day:
    A privilege-escalation flaw in the Windows kernel is now being abused in real attacks. We cover what’s known, how attackers are chaining it, and the immediate mitigations security teams should prioritize.
  • FortiWeb Critical Vulnerability Added to CISA’s KEV Catalog:
    A newly disclosed remote code execution vulnerability in Fortinet FortiWeb has officially landed in the Known Exploited Vulnerabilities list. We explain exploitation paths, affected versions, and patch timelines.
  • Akira Ransomware Expands to Nutanix Virtualized Environments:
    Akira operators have widened their targeting to include Nutanix AHV systems, giving them deeper access into enterprise virtualization layers. We break down how they’re gaining initial entry and what defenders can harden right now.

Clear explanations. No fluff. Practical takeaways you can use today.

Actionable Cybersecurity Insights — Every Week.
Visit InfoSec.Watch for the full newsletter and links to all sources mentioned in this episode.

  continue reading

One episode