Imagen de portada del espectáculo InfoSec.Watch

InfoSec.Watch

Podcast de Infosec.Watch

inglés

Actualidad y política

Oferta limitada

2 meses por 1 €

Después 4,99 € / mesCancela cuando quieras.

  • 20 horas de audiolibros / mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Empezar

Acerca de InfoSec.Watch

The InfoSec.Watch Podcast delivers the week’s most important cybersecurity news in a fast, clear, and actionable format. Each episode breaks down major incidents, vulnerabilities, threat-actor activity, and security trends affecting modern organizations — without the noise or hype.The show translates complex cyber topics into practical insights you can use immediately in your job, whether you work in security engineering, cloud security, threat detection, governance, or IT.If you want to stay ahead of emerging threats, sharpen your defensive mindset, and get a reliable summary of what actually matters each week, this is your new essential briefing.Actionable Cybersecurity Insights — Every Week.

Todos los episodios

20 episodios

Portada del episodio 138 - Security Leverage Points

138 - Security Leverage Points

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track the security stories that give attackers the most leverage, from AI-assisted exploit development to SaaS platform compromise, manufacturing ransomware, and high-impact vulnerabilities. We end with a practical defensive check: a short control plane exposure register that shows exactly which systems could change trust, access, routing, revenue, or production at scale.  • AI-assisted zero-day exploit and why admin tools move to the top of the patch queue  • Phishing-resistant MFA and reviewing trusted path assumptions for bypass risk  • Canvas incident and the need for tenant-level SaaS impact assessment  • Manufacturing ransomware as business disruption strategy across logistics and production  • Cisco Catalyst SD-WAN controller authentication bypass and control plane blast radius  • Exchange OWA KEV-driven mitigations and using deadlines for escalation  • WordPress FunnelKit exploit leading to WooCommerce checkout skimming and script audits  • Leverage-point thinking for modern asset inventory and exposure management  • Control plane exposure register fields, owners, logs, rollback paths, review cadence  If you want daily updates between episodes, you can find us on X, Facebook, and LinkedIn. Just search InfoSecWatch. And if you haven't already, head over to InfoSec.watch and grab the free weekly newsletter. It's concise, it's practitioner focused, and it lands every week.  Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

18 de may de 2026 - 10 min
Portada del episodio 130 - When Trusted Tools Turn On You

130 - When Trusted Tools Turn On You

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track how trust boundaries fail across the modern stack, from CI/CD supply chain compromise to phishing-driven account takeover and remote assistance abuse. We also break down actively exploited vulnerabilities and a practical tier 0 validation loop that treats patching like incident response, not routine maintenance. • supply chain compromise risk when trusted CI/CD tooling is abused for credential theft • behavior-based hunting on build systems, including anomalous execution and network egress • phishing campaigns against Signal and WhatsApp framed as identity compromise at scale • Microsoft Teams social engineering path to Quick Assist remote access and intrusion expansion • vulnerability triage for active exploitation, including Cisco FMC CVE-2026-20131 and rapid weaponization of new disclosures • mobile exploit kit reporting and why device takeover belongs in tier 0 thinking • IoT botnet disruption as a prompt to inventory unmanaged devices and validate network visibility • one-week tier 0 validation loop: verify versions, remove exposure, review logs, rotate secrets Follow the show on X, Facebook, and LinkedIn, and subscribe at https://infosec.watch. Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

26 de mar de 2026 - 17 min
Portada del episodio 129 - Quick Assist, Slow Panic

129 - Quick Assist, Slow Panic

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track how attackers keep turning trusted channels into reliable intrusion paths, from extension marketplaces to chat platforms and developer dependencies. We also lay out what defenders should patch first and how to validate fixes so security work actually reduces risk. • Glasswarm escalation against Open VSX using a modular loader for stealthier propagation • Why defenders need full intrusion chain telemetry across execution, persistence and C2 • Microsoft Teams phishing that impersonates IT and abuses Quick Assist for remote access • Living off the land detection focused on behaviors rather than specific malware files • Astronata backdooring React Native packages to steal crypto wallets and developer credentials • Software supply chain hygiene through provenance checks and dependency trust path reviews • Chrome vulnerabilities exploited in the wild and why pre-patch hunting matters • Veeam critical flaws and treating backup infrastructure as a tier zero asset • VPN credential theft campaigns and enforcing MFA across every authentication path • Post-patching rigor with version checks, exposure validation, log review and secret rotation Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

20 de mar de 2026 - 8 min
Portada del episodio 128 - AI Malware Floods And Patch Tsunamis

128 - AI Malware Floods And Patch Tsunamis

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track a clear theme across this week’s security headlines: everything is getting bigger, faster, and harder to manage, from AI-generated malware to massive patch waves. We focus on cutting blast radius with risk-based patching, resilience-first strategy, and automation that can keep up with machine-scale attacks.  • AI-assisted malware as a volume play that strains signature-based detection  • CISA KEV additions affecting physical security tech and industrial OT environments  • Cisco firewall patch surge and why perfect-10 bugs demand rapid edge triage  • Risk-based prioritization starting with the most exposed internet-facing devices  • VMware ARIA Operations auth bypass as a high-impact management-plane risk  • Nginx UI remote code execution as a supply chain style weak link  • Resilience mindset built on detection, response, and rehearsed incident response plans  • Automated sandboxing and modern EDR to counter high-volume malware  • Continuous security awareness training that teaches and builds security culture  Don't forget to follow us on X, Facebook, or LinkedIn, and be sure to subscribe to our newsletter at infosec.watch for the latest updates.  Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

12 de mar de 2026 - 8 min
Portada del episodio 127 - From Cisco To EV Chargers: Active Exploits And Urgent Patches

127 - From Cisco To EV Chargers: Active Exploits And Urgent Patches

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] A wave of edge and control‑plane threats drives urgent patching and smarter validation across Cisco SD‑WAN, EV charging, FileZen, and Serve‑U. We map real exploits, spotlight APT28 tradecraft, unpack Google risk shifts, and share a post‑patch playbook that assumes breach. • Cisco SD‑WAN 10.0 authentication bypass and active exploitation • CISA KEV update for FileZen and patch prioritization • EV charging platform flaws enabling session hijack and station impersonation • APT28 targeting MSHTML and legacy components as modern vectors • One Uptime 10.0 root‑level exploit via traceroute probes • Google localhost WebSocket risk and policy reversals on token proxying • Governance for agentic AI with supervised fine‑tuning and oversight • Quick hits on North Korean air‑gap tools and UNC2814 disruption • Serve‑U critical updates and file transfer exposure • EU CRA impacts on open source supply chains • Post‑patch validation: verify versions, confirm exposure is gone, hunt logs, rotate secrets • Continuous exposure management for control planes and edge systems For more in-depth analysis and links to everything we discussed today, be sure to subscribe to our newsletter at infosec.watch Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

6 de mar de 2026 - 10 min
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Elige tu suscripción

Más populares

Oferta limitada

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

2 meses por 1 €
Después 4,99 € / mes

Empezar

Premium Plus

100 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Disfruta 30 días gratis
Después 9,99 € / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Empezar

2 meses por 1 €. Después 4,99 € / mes. Cancela cuando quieras.