Podcast Episodes

Back to Search
Netgear, Gigabyte, and Rowhammer Vulnerabilities

Netgear, Gigabyte, and Rowhammer Vulnerabilities


Episode 55


In this episode of Below the Surface, the hosts discuss critical cybersecurity topics including vulnerabilities in Netgear and Gigabyte devices, the importance of asset inventory, and the implication…


Published on 4 months, 3 weeks ago

CVE-2024-54085: The First of Its Kind

CVE-2024-54085: The First of Its Kind


Episode 54


In this episode, the hosts delve into the critical vulnerabilities associated with Baseboard Management Controllers (BMCs), with a particular focus on CVE-2024-54085. They discuss the ease of exploit…


Published on 5 months, 1 week ago

Exploring the Evolution of Zero Trust

Exploring the Evolution of Zero Trust


Episode 53


In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Ba…


Published on 5 months, 1 week ago

Securing the Future of AI Infrastructure

Securing the Future of AI Infrastructure


Episode 52


In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Ba…


Published on 5 months, 2 weeks ago

When Windows 10 Expires

When Windows 10 Expires


Episode 51


In this episode, the hosts discuss the impending end of life for Windows 10 and the necessary preparations for upgrading to Windows 11. They explore the specific hardware requirements for Windows 11,…


Published on 6 months, 2 weeks ago

SBOMs, HBOMs, and Supply Chain Visibility

SBOMs, HBOMs, and Supply Chain Visibility


Episode 50


Summary

In this episode, Paul Asadoorian and Joshua Marpet delve into the complexities of compliance, inventory management, and the emerging concepts of SBOMs, HBOMs, and FBOMs (no, not that FBOM). T…


Published on 7 months ago

The Hidden Risks of Open Source Components

The Hidden Risks of Open Source Components



In this episode, Paul Asadorian and Josh Bressers delve into the complexities of open source supply chain security, discussing the prevalence of open source components in modern software, the challen…


Published on 7 months, 1 week ago

Hardware Hacking Tips & Tricks

Hardware Hacking Tips & Tricks


Episode 48


In this episode, Paul and Chase delve into the world of hardware hacking, focusing on devices like the Flipper Zero and ESP32. They discuss the various applications of these tools, their impact on aw…


Published on 8 months, 1 week ago

BMC&C Part 3

BMC&C Part 3


Episode 47


In this episode, Paul Asadoorian, Vlad Babkin, and Chase Snyder delve into the latest vulnerability disclosures related to Baseboard Management Controllers (BMCs), specifically focusing on AMI Megara…


Published on 8 months, 3 weeks ago

Black Basta - Threat Intelligence Insights - BTS #46

Black Basta - Threat Intelligence Insights - BTS #46


Episode 46


In this episode, Paul Asadoorian, Vlad Babkin, and Chase Snyder delve into the recent leaks from the Black Basta ransomware group, exploring the implications of the leaked chat logs, the operational …


Published on 9 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate