Podcast Episodes

Back to Search
Red November, Cisco Vulnerabilities, and Supply Chain Security

Red November, Cisco Vulnerabilities, and Supply Chain Security


Episode 61


In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the Red November campaign targeting network edge devices, the implications of the Cisco SNMP vulnerabil…


Published on 12 hours ago

HybridPetya and UEFI Threats

HybridPetya and UEFI Threats


Episode 60


In this episode of Below the Surface, the hosts discuss various cybersecurity topics, including the evolution of malware with a focus on Hybrid Petya, the implications of UEFI vulnerabilities, and th…


Published on 2 weeks, 2 days ago

Exploit Marketplaces

Exploit Marketplaces


Episode 59


In this episode of Below the Surface, host Paul Asadoorian speaks with Evan Dornbush, CEO of Desired Effect, about the evolving landscape of exploit marketplaces and vulnerability research. They disc…


Published on 4 weeks ago

UEFI Vulnerabilities and Hardware Risks

UEFI Vulnerabilities and Hardware Risks


Episode 58


In this episode, the hosts discuss various cybersecurity topics, focusing on hardware vulnerabilities, UEFI attack vectors, and the implications of new regulations on device security. They explore th…


Published on 1 month ago

Interview with Brian Mullen from AMI

Interview with Brian Mullen from AMI


Episode 57


In this episode of Below the Surface, host Paul Asadoorian is joined by Brian Mullen, head of SSDLC at AMI, to discuss the complexities of supply chain and firmware security. They explore the challen…


Published on 1 month, 3 weeks ago

Vulnerabilities & Backdoors In IT Infrastructure

Vulnerabilities & Backdoors In IT Infrastructure


Episode 56


In this episode, the hosts discuss various cybersecurity topics, focusing on Nvidia vulnerabilities, the implications of backdoors in technology, and the importance of secure boot and certificate man…


Published on 2 months ago

Netgear, Gigabyte, and Rowhammer Vulnerabilities

Netgear, Gigabyte, and Rowhammer Vulnerabilities


Episode 55


In this episode of Below the Surface, the hosts discuss critical cybersecurity topics including vulnerabilities in Netgear and Gigabyte devices, the importance of asset inventory, and the implication…


Published on 2 months, 2 weeks ago

CVE-2024-54085: The First of Its Kind

CVE-2024-54085: The First of Its Kind


Episode 54


In this episode, the hosts delve into the critical vulnerabilities associated with Baseboard Management Controllers (BMCs), with a particular focus on CVE-2024-54085. They discuss the ease of exploit…


Published on 3 months ago

Exploring the Evolution of Zero Trust

Exploring the Evolution of Zero Trust


Episode 53


In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Ba…


Published on 3 months ago

Securing the Future of AI Infrastructure

Securing the Future of AI Infrastructure


Episode 52


In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Ba…


Published on 3 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate