Coverbild der Sendung InfoSec.Watch

InfoSec.Watch

Podcast von Infosec.Watch

Englisch

Nachrichten & Politik

Begrenztes Angebot

2 Monate für 1 €

Dann 4,99 € / MonatJederzeit kündbar.

  • 20 Stunden Hörbücher / Monat
  • Podcasts nur bei Podimo
  • Alle kostenlosen Podcasts
Loslegen

Mehr InfoSec.Watch

The InfoSec.Watch Podcast delivers the week’s most important cybersecurity news in a fast, clear, and actionable format. Each episode breaks down major incidents, vulnerabilities, threat-actor activity, and security trends affecting modern organizations — without the noise or hype.The show translates complex cyber topics into practical insights you can use immediately in your job, whether you work in security engineering, cloud security, threat detection, governance, or IT.If you want to stay ahead of emerging threats, sharpen your defensive mindset, and get a reliable summary of what actually matters each week, this is your new essential briefing.Actionable Cybersecurity Insights — Every Week.

Alle Folgen

20 Folgen

Episode 138 - Security Leverage Points Cover

138 - Security Leverage Points

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track the security stories that give attackers the most leverage, from AI-assisted exploit development to SaaS platform compromise, manufacturing ransomware, and high-impact vulnerabilities. We end with a practical defensive check: a short control plane exposure register that shows exactly which systems could change trust, access, routing, revenue, or production at scale.  • AI-assisted zero-day exploit and why admin tools move to the top of the patch queue  • Phishing-resistant MFA and reviewing trusted path assumptions for bypass risk  • Canvas incident and the need for tenant-level SaaS impact assessment  • Manufacturing ransomware as business disruption strategy across logistics and production  • Cisco Catalyst SD-WAN controller authentication bypass and control plane blast radius  • Exchange OWA KEV-driven mitigations and using deadlines for escalation  • WordPress FunnelKit exploit leading to WooCommerce checkout skimming and script audits  • Leverage-point thinking for modern asset inventory and exposure management  • Control plane exposure register fields, owners, logs, rollback paths, review cadence  If you want daily updates between episodes, you can find us on X, Facebook, and LinkedIn. Just search InfoSecWatch. And if you haven't already, head over to InfoSec.watch and grab the free weekly newsletter. It's concise, it's practitioner focused, and it lands every week.  Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

18. Mai 2026 - 10 min
Episode 130 - When Trusted Tools Turn On You Cover

130 - When Trusted Tools Turn On You

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track how trust boundaries fail across the modern stack, from CI/CD supply chain compromise to phishing-driven account takeover and remote assistance abuse. We also break down actively exploited vulnerabilities and a practical tier 0 validation loop that treats patching like incident response, not routine maintenance. • supply chain compromise risk when trusted CI/CD tooling is abused for credential theft • behavior-based hunting on build systems, including anomalous execution and network egress • phishing campaigns against Signal and WhatsApp framed as identity compromise at scale • Microsoft Teams social engineering path to Quick Assist remote access and intrusion expansion • vulnerability triage for active exploitation, including Cisco FMC CVE-2026-20131 and rapid weaponization of new disclosures • mobile exploit kit reporting and why device takeover belongs in tier 0 thinking • IoT botnet disruption as a prompt to inventory unmanaged devices and validate network visibility • one-week tier 0 validation loop: verify versions, remove exposure, review logs, rotate secrets Follow the show on X, Facebook, and LinkedIn, and subscribe at https://infosec.watch. Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

26. März 2026 - 17 min
Episode 129 - Quick Assist, Slow Panic Cover

129 - Quick Assist, Slow Panic

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track how attackers keep turning trusted channels into reliable intrusion paths, from extension marketplaces to chat platforms and developer dependencies. We also lay out what defenders should patch first and how to validate fixes so security work actually reduces risk. • Glasswarm escalation against Open VSX using a modular loader for stealthier propagation • Why defenders need full intrusion chain telemetry across execution, persistence and C2 • Microsoft Teams phishing that impersonates IT and abuses Quick Assist for remote access • Living off the land detection focused on behaviors rather than specific malware files • Astronata backdooring React Native packages to steal crypto wallets and developer credentials • Software supply chain hygiene through provenance checks and dependency trust path reviews • Chrome vulnerabilities exploited in the wild and why pre-patch hunting matters • Veeam critical flaws and treating backup infrastructure as a tier zero asset • VPN credential theft campaigns and enforcing MFA across every authentication path • Post-patching rigor with version checks, exposure validation, log review and secret rotation Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

20. März 2026 - 8 min
Episode 128 - AI Malware Floods And Patch Tsunamis Cover

128 - AI Malware Floods And Patch Tsunamis

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track a clear theme across this week’s security headlines: everything is getting bigger, faster, and harder to manage, from AI-generated malware to massive patch waves. We focus on cutting blast radius with risk-based patching, resilience-first strategy, and automation that can keep up with machine-scale attacks.  • AI-assisted malware as a volume play that strains signature-based detection  • CISA KEV additions affecting physical security tech and industrial OT environments  • Cisco firewall patch surge and why perfect-10 bugs demand rapid edge triage  • Risk-based prioritization starting with the most exposed internet-facing devices  • VMware ARIA Operations auth bypass as a high-impact management-plane risk  • Nginx UI remote code execution as a supply chain style weak link  • Resilience mindset built on detection, response, and rehearsed incident response plans  • Automated sandboxing and modern EDR to counter high-volume malware  • Continuous security awareness training that teaches and builds security culture  Don't forget to follow us on X, Facebook, or LinkedIn, and be sure to subscribe to our newsletter at infosec.watch for the latest updates.  Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

12. März 2026 - 8 min
Episode 127 - From Cisco To EV Chargers: Active Exploits And Urgent Patches Cover

127 - From Cisco To EV Chargers: Active Exploits And Urgent Patches

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] A wave of edge and control‑plane threats drives urgent patching and smarter validation across Cisco SD‑WAN, EV charging, FileZen, and Serve‑U. We map real exploits, spotlight APT28 tradecraft, unpack Google risk shifts, and share a post‑patch playbook that assumes breach. • Cisco SD‑WAN 10.0 authentication bypass and active exploitation • CISA KEV update for FileZen and patch prioritization • EV charging platform flaws enabling session hijack and station impersonation • APT28 targeting MSHTML and legacy components as modern vectors • One Uptime 10.0 root‑level exploit via traceroute probes • Google localhost WebSocket risk and policy reversals on token proxying • Governance for agentic AI with supervised fine‑tuning and oversight • Quick hits on North Korean air‑gap tools and UNC2814 disruption • Serve‑U critical updates and file transfer exposure • EU CRA impacts on open source supply chains • Post‑patch validation: verify versions, confirm exposure is gone, hunt logs, rotate secrets • Continuous exposure management for control planes and edge systems For more in-depth analysis and links to everything we discussed today, be sure to subscribe to our newsletter at infosec.watch Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

6. März 2026 - 10 min
Super gut, sehr abwechslungsreich Podimo kann man nur weiterempfehlen
Super gut, sehr abwechslungsreich Podimo kann man nur weiterempfehlen
Ich liebe Podcasts, Hörbücher u. -spiele, Dokus usw. Hier habe ich genügend Auswahl. Macht 👍 weiter so

Wähle dein Abonnement

Am beliebtesten

Begrenztes Angebot

Premium

20 Stunden Hörbücher

  • Podcasts nur bei Podimo

  • Keine Werbung in Podimo Podcasts

  • Jederzeit kündbar

2 Monate für 1 €
Dann 4,99 € / Monat

Loslegen

Premium Plus

100 Stunden Hörbücher

  • Podcasts nur bei Podimo

  • Keine Werbung in Podimo Podcasts

  • Jederzeit kündbar

30 Tage kostenlos testen
Dann 13,99 € / monat

Kostenlos testen

Nur bei Podimo

Beliebte Hörbücher

Loslegen

2 Monate für 1 €. Dann 4,99 € / Monat. Jederzeit kündbar.