Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
- L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate
- Microsoft WSUS bug being exploited in the wild
- Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG
- SpaceX finally starts disabling Starlink terminals used by scammers
- Garbage HP update deletes certificates that authed Windows systems to Entra
This week’s episode is sponsored by automation company Tines. Field CISO Matt Muller joins to discuss how Tines has embraced LLMs and the agentic-AI future into their workflow automation.
This episode is also available on Youtube.
Show notes- US accuses former L3Harris cyber boss of stealing and selling secrets to Russian buyer | TechCrunch
- Attackers bypass patch in deprecated Windows Server update tool | CyberScoop
- CVE-2025-59287 WSUS Unauthenticated RCE | HawkTrace
- CVE-2025-59287 WSUS Remote Code Execution | HawkTrace
- Catching Credential Guard Off Guard - SpecterOps
- Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica
- Uncovering Qilin attack methods exposed through multiple cases
- Safety on X: "By November 10, we’re asking all accounts that use a security key as their two factor authentication (2FA) method to re-enroll their key to continue accessing X. You can re-enroll your existing security key, or enroll a new one. A reminder: if you enroll a new security key, any" / X
- SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds | The Record from Recorded Future News
- SpaceX: Update Your Inactive Starlink Dishes Now or They'll Be Bricked
- How we linked ForumTroll APT to Dante spyware by Memento Labs | Securelist
- Former Polish official indicted over spyware purchase | The Record from Recorded Future News
- HP OneAgent Update Broke Entra Trust on HP AI Devices
- Windows' Built-in OpenSSH for Offensive Security
- How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA | WIRED
Todavía no hay opiniones