Podcast Episodes

Back to Search
Determining Vulnerability Exploitation With Real Software Activity - PSW #672
Determining Vulnerability Exploitation With Real Software Activity - PSW #672

Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interactio…

5 years, 5 months ago

Short Long
View Episode
Discord Vulnerabilities, Chrome 0-Day, & Severe WordPress Flaw - PSW #671
Discord Vulnerabilities, Chrome 0-Day, & Severe WordPress Flaw - PSW #671

In the Security News, Testing firm NSS Labs closes up shop, stringing vulnerabilities together to pwn the Discord desktop app, a Wordpress plugin aim…

5 years, 5 months ago

Short Long
View Episode
Hackers Hitting Below The Belt - Scott Scheferman - PSW #671
Hackers Hitting Below The Belt - Scott Scheferman - PSW #671

In 2020 attackers are increasingly targeting firmware and hardware - going below the operating system to hide from traditional security solutions and…

5 years, 5 months ago

Short Long
View Episode
Sysmon Endpoint Monitoring, Now w/ Clipboard Voyeurism - Corey Thuen - PSW #671
Sysmon Endpoint Monitoring, Now w/ Clipboard Voyeurism - Corey Thuen - PSW #671

Sysmon is a free endpoint monitoring tool published by Microsoft in their sysinternals suite. It generates process creations, network connections, fi…

5 years, 5 months ago

Short Long
View Episode
'BleedingTooth' Vulnerability, Zoom Rolls Out E2EE, & 50,000 Cameras Compromised - PSW #670
'BleedingTooth' Vulnerability, Zoom Rolls Out E2EE, & 50,000 Cameras Compromised - PSW #670

In the Security News, Microsoft Uses Trademark Law to Disrupt Trickbot Botnet, Barnes & Noble cyber incident could expose customer shipping addresses…

5 years, 5 months ago

Short Long
View Episode
Democratizing & Saasifying Security Operations - Patrick Garrity - PSW #670
Democratizing & Saasifying Security Operations - Patrick Garrity - PSW #670

Threats are no longer only a concern of large sophisticated organizations and there is a continued need to democratize security operations and contro…

5 years, 5 months ago

Short Long
View Episode
Prioritize This, Prioritize That, Prioritize With Context! - Roi Cohen, Shani Dodge - PSW #670
Prioritize This, Prioritize That, Prioritize With Context! - Roi Cohen, Shani Dodge - PSW #670

Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS bas…

5 years, 5 months ago

Short Long
View Episode
10 Years Since Stuxnet, Rare Bootkit Discovered, & Thin Client Vulnerabilities - PSW #669
10 Years Since Stuxnet, Rare Bootkit Discovered, & Thin Client Vulnerabilities - PSW #669

US Air Force slaps Googly container tech on yet another war machine to 'run advanced ML algorithms', Rare Firmware Rootkit Discovered Targeting Diplo…

5 years, 5 months ago

Short Long
View Episode
Assembling Your First Infosec Home Lab - Tony "tjnull" Punturiero - PSW #669
Assembling Your First Infosec Home Lab - Tony "tjnull" Punturiero - PSW #669

Assembling an infosec home lab is great way to learn more about the ever-changing programs and systems in the cyber world. However, it can get compli…

5 years, 5 months ago

Short Long
View Episode
Fast And Secure Web - Alexander Krizhanovsky - PSW #669
Fast And Secure Web - Alexander Krizhanovsky - PSW #669

Tempesta FW is an open source hybrid of an HTTPS accelerator and a firewall aiming to accelerate web resources and protect them against DDoS and web …

5 years, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us