Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
1
🔴 Jan 31’s Top Cyber News NOW! - Ep 804
1:57:47
1:57:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:57:47
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast Jan 31st 2025: Old Netgear Vuln in Depth; Lightning AI RCE; Canon Printer RCE; Deepseek Leak;
5:40
5:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:40
PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary] https://isc.sans.edu/diary/PCAPs%20or%20It%20Didn%27t%20Happen%3A%20Exposing%20an%20Old%20Netgear%20Vulnerability%20Still%20Active%20in%202025%20%5BGuest%20Diary%5D/31638 RCE Vulnerablity in AI Development Platform Lightning AI Noma Security discover…
…
continue reading
1
🔴 Jan 30’s Top Cyber News NOW! - Ep 803
1:30:26
1:30:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:30:26
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 30th 2025: Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch
5:33
5:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:33
From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows https://isc.sans.edu/diary/From%20PowerShell%20to%20a%20Python%20Obfuscation%20Race!/31634 Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices An exploit for thi…
…
continue reading
1
🔴 Jan 29’s Top Cyber News NOW! - Ep 802
1:36:42
1:36:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:36:42
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 29th 2025: Python Crypto Stealer; SimpleHelp Exploited; Apple Silicon Vuln; Teamviewer Vuln; Odd QR Code
6:07
6:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:07
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It do…
…
continue reading
1
🔴 Jan 28’s Top Cyber News NOW! - Ep 801
2:03:26
2:03:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:03:26
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 28th 2025: Z-Shy Phishing; Apple Patches 0-Day; Fortinet Exploit Details; Github and Apache Solr Patches
6:14
6:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:14
This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML entitiy. We got an update from Apple fixing a 0-day vulnerability in addition to a number of other issues. watchTowr show how to exploit an interesting FortiOS vulnerability and we have patches for Github Desktop and Apache Solr An unusal shy z-wasp …
…
continue reading
1
🔴 Jan 27’s Top Cyber News NOW! - Ep 800
1:30:15
1:30:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:30:15
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak
6:28
6:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:28
Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive i…
…
continue reading
1
🔴 Jan 24’s Top Cyber News NOW! - Ep 799
2:00:27
2:00:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:00:27
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo)
14:45
14:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:45
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
…
continue reading
1
🔴 Jan 23’s Top Cyber News NOW! - Ep 798
1:33:35
1:33:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:33:35
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance
7:49
7:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:49
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
…
continue reading
1
🔴 Jan 22’s Top Cyber News NOW! - Ep 797
1:38:17
1:38:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:38:17
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing
9:16
9:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:16
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
…
continue reading
1
🔴 Jan 21’s Top Cyber News NOW! - Ep 796
1:34:22
1:34:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:34:22
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 21, 2025: Downloading Partial ZIP files; Remote Tools Used in Attakcs; Azure DevOps SSRF
6:20
6:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:20
In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
…
continue reading
1
🔴 Jan 20’s Top Cyber News NOW! - Ep 795
1:30:58
1:30:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:30:58
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities
3:24
3:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:24
In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent gues…
…
continue reading
1
🔴 Jan 17’s Top Cyber News NOW! - Ep 794
1:33:08
1:33:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:33:08
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
SANS ISC Stormcast, Jan 17, 2025: Analyzing Complex Datasets, Citrix Update Issues, Ivanti's Security Advisory, and the Future of Passkeys (@sans_edu)
12:50
12:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:50
In this episode, we explore the efficient storage of honeypot logs in databases, issues with Citrix's Session Recording Agent and Windows Update. Ivanti is having another interesting security event and our SANS.edu graduate student Rich Green talks about his research on Passkeys. Extracting Practical Observations from Impractical Datasets: A SANS I…
…
continue reading
1
🔴 Jan 16’s Top Cyber News NOW! - Ep 793
1:32:14
1:32:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:32:14
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
SANS ISC Stormcast, Jan 16, 2025: Critical Vulnerabilities and Cybersecurity Updates You Need to Know
9:02
9:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:02
Today's episode covers an odd 12 year old Netgear vulnerability that only received a proper CVE number last year. Learn about how to properly identify OpenID connect users and avoid domain name resue. Good old rsync turns out to be in need of patching and Fortinet: Not sure if it needs patching. Probably it does. Go ahead and patch it. The Curious …
…
continue reading
1
🔴 Jan 15’s Top Cyber News NOW! - Ep 792
44:04
44:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:04
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches
7:48
7:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:48
Today, Microsoft Patch Tuesday headlines our news with Microsoft patching 209 vulnerabilities, some of which have already been exploited. Fortinet suspects a so far unpatched Node.js authentication bypass to be behind some recent exploits of FortiOS and FortiProxy devices. Microsoft January 2025 Patch Tuesday This month's Microsoft patch update add…
…
continue reading
1
🔴 Jan 14’s Top Cyber News NOW! - Ep 791
2:18:29
2:18:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:18:29
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
SANS ISC Stormcast, Jan 14, 2025: Brute-Forcing Hikvision Devices, macOS SIP Bypass, Linux Rootkits, Aviatrix Exploits, and AWS Ransomware Tactics
7:51
7:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:51
Episode Summary: This episode covers brute-force attacks on the password reset functionality of Hikvision devices, a macOS SIP bypass vulnerability, Linux rootkit malware, and a novel ransomware campaign targeting AWS S3 buckets. Topics Covered: Hikvision Password Reset Brute Forcing URL: https://isc.sans.edu/diary/Hikvision%20Password%20Reset%20Br…
…
continue reading
1
🔴 Jan 13’s Top Cyber News NOW! - Ep 790
1:32:22
1:32:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:32:22
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
SANS ISC Stormcast, Jan 13, 2025: Defender Updates, Ivanti RCE, Apple USB-C Hack and more
6:43
6:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:43
In today's episode, we cover the latest updates in cybersecurity: Windows Defender Enhances Chrome Extension Detection Microsoft's Defender now catalogs Chrome extensions to identify malicious ones. Learn how this improves enterprise security. https://isc.sans.edu/diary/Windows%20Defender%20Chrome%20Extension%20Detection/31574 Multi-OLE Analysis in…
…
continue reading
1
🔴 Jan 10’s Top Cyber News NOW! - Ep 789
1:34:49
1:34:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:34:49
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast: Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vulnerabilities. Jan 9th 2024
7:19
7:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:19
In this episode, we explore the following stories: "Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics" Overview of Redtail's multi-architecture cryptomining malware exploiting vulnerabilities and deploying persistence techniques. URL: Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its …
…
continue reading
1
🔴 Jan 9’s Top Cyber News NOW! - Ep 788
1:34:26
1:34:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:34:26
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyphontraining…
…
continue reading
1
SANS ISC Stormcast, Jan 9, 2025: Critical Vulnerabilities in Ivanti, Aviatrix, and Hijacked Backdoors in Compromised Systems
6:04
6:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:04
In this episode, we discuss critical vulnerabilities in Ivanti Connect Secure and Policy Secure, command injection risks in Aviatrix Network Controllers, and the risks posed by hijacked abandoned backdoors. Episode Links and Topics: More Governments Backdoors in Your Backdoors https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/…
…
continue reading