Podcast Episodes
Back to SearchWhat Is an Attack Graph
An overview of cybersecurity attack graphs, focussing on attack graphs overview
10 months, 3 weeks ago
What is Prompt Injection
An overview of cybersecurity LLM vulnerabilities, focussing on prompt injection
10 months, 3 weeks ago
KiloEx Oracle 7M KiloEx Cross Chain Oracle Exploit
A flawed access control in KiloEx s cross chain price oracle let attackers drain 7M across BNB Chain, Base and Taiko, forcing emergency patches and …
10 months, 3 weeks ago
KiloEx oracle KiloEx 7M cross chain hack & recovery
Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s 7M cross chain oracle exploit & …
10 months, 3 weeks ago
What is Threat Research Automation
An overview of cybersecurity threat research automation, focussing on cybersecurity automation
11 months ago
iOS, Android, Windows Vulnerabilities in Big Tech Security Updates
Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android,…
11 months ago
Introduction to Lateral Movement Attacks
An overview of cybersecurity lateral movement attacks, focussing on lateral movement attacks
11 months, 1 week ago
Google Chrome Tech Giants vs. Cyber Threats A Dynamic Battle
Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and …
11 months, 1 week ago
Understanding Heap Based Overflow
An overview of cybersecurity heap based overflow vulnerability, focussing on heap based overflow vulnerability
11 months, 2 weeks ago
Google Chrome Exploring Zero Day Vulnerabilities in Chrome
The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. I…
11 months, 2 weeks ago