Imagen de portada del espectáculo Cybersecurity

Cybersecurity

Podcast de Veljko Massimo Plavsic

inglés

Actualidad y política

Oferta limitada

2 meses por 1 €

Después 4,99 € / mesCancela cuando quieras.

  • 20 horas de audiolibros / mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Empezar

Acerca de Cybersecurity

Notizie delle truffe online e come proteggerci dai malintenzionati.Io stesso sono stato la vittima della truffa e ho deciso di diffondere le informazioni per evitare e prevenire ulteriori vittime.Become a supporter of this podcast: https://www.spreaker.com/podcast/cybersecurity--6500043/support.

Todos los episodios

5 episodios

Portada del episodio Cyber-Bailout__How_the_JLR_Hack_Exposed_Automotive_s_Systemic_C

Cyber-Bailout__How_the_JLR_Hack_Exposed_Automotive_s_Systemic_C

Beyond Data Theft: Three Shocking Real-World Impacts of the Jaguar Land Rover Cyberattack In base a 1 fonte Beyond Data Theft: Three Shocking Real-World Impacts of the Jaguar Land Rover Cyberattack Introduction: The Hidden Vulnerability of Modern Manufacturing When we picture automotive manufacturing, we often think of sparks flying on an assembly line, of heavy machinery pressing steel, and the physical act of building a vehicle. It's a world of tangible, industrial might. But beneath this physical surface lies a complex and increasingly vulnerable digital infrastructure that controls everything from supply chains to the robots on the factory floor. What happens when this digital foundation is attacked? The recent cybercrime incident at Jaguar Land Rover (JLR) provides a stark and critical case study. This was not merely an IT issue or a data breach; it was an event with significant, tangible consequences that rippled through the company's entire operation. The JLR incident serves as a powerful lesson for the entire automotive industry, demonstrating just how severe the real-world fallout from a digital attack can be. This article breaks down the three most significant consequences of the attack, moving beyond abstract digital threats to concrete operational and financial disasters. Takeaway 1: Cyberattacks Don't Just Steal Data—They Halt Production Become a supporter of this podcast: https://www.spreaker.com/podcast/cybersecurity--6500043/support [https://www.spreaker.com/podcast/cybersecurity--6500043/support?utm_source=rss&utm_medium=rss&utm_campaign=rss].

7 de oct de 2025 - 8 min
Portada del episodio The_UniPwn_Exploit

The_UniPwn_Exploit

Security Briefing: UniPwn Vulnerability in Unitree Robotic Platforms In base a 1 fonte Security Briefing: UniPwn Vulnerability in Unitree Robotic Platforms 1.0 Overview and Purpose This briefing provides a detailed technical analysis of "UniPwn," a critical vulnerability affecting specific Unitree robotic platforms. The purpose of this document is to inform security personnel and decision-makers of the exploit's mechanism, outline the significant operational and strategic risks, and prescribe actionable mitigation strategies. The information presented is derived from a public disclosure by security researchers and subsequent reporting. Key Findings at a Glance • Vulnerability: A critical, wormable exploit named "UniPwn" exists within the Bluetooth Low Energy (BLE) Wi-Fi configuration interface of affected robots. • Affected Systems: The vulnerability impacts Unitree's Go2 and B2 quadruped models, as well as the G1 and H1 humanoid models. • Impact: Catastrophic. The exploit enables complete, root-level takeover of the robot. This allows for malicious actions ranging from data exfiltration and persistent espionage to the creation of autonomous, self-propagating robot botnets. • Vendor Status: The researchers notified Unitree in May, but the vendor ceased communication in July after little progress. Unitree publicly acknowledged "security vulnerabilities" on September 29 and announced that fixes "will be rolled out... in the near future." • Immediate Action: Short-term mitigation is critical and requires immediate network isolation and disabling the robot's Bluetooth functionality to remove the primary attack vector. Become a supporter of this podcast: https://www.spreaker.com/podcast/cybersecurity--6500043/support [https://www.spreaker.com/podcast/cybersecurity--6500043/support?utm_source=rss&utm_medium=rss&utm_campaign=rss].

2 de oct de 2025 - 6 min
Regístrate para escuchar
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Elige tu suscripción

Más populares

Oferta limitada

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

2 meses por 1 €
Después 4,99 € / mes

Empezar

Premium Plus

100 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Disfruta 30 días gratis
Después 9,99 € / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Empezar

2 meses por 1 €. Después 4,99 € / mes. Cancela cuando quieras.