TWiET 473: Anatomy of an Outage - Preventing more global internet outages, TWiET 2022 Wishlist
"Incredible and terrifying" zero-click exploit used to hack Apple devices from NSO Group...
01:15:13
TWiET 473: Anatomy of an Outage - Preventing more global internet outages, TWiET 2022 Wishlist
"Incredible and terrifying" zero-click exploit used to hack Apple devices from NSO Group...
01:15:13
TWiET 472: Kong: API Dogfooding - AWS outage, API Management with Kong
Researchers find third party libraries in popular apps have a remote code execution vulnerability...
01:16:01
Former Ubiquiti developer charged with trying to extort employer New Yanluowang ransomware...
01:10:04
TWiET 470: SCADA Potatah - Bringing order to the elements of production
Chinese government asking chipmakers to prioritize Chinese clients Looks like Nvidia's Arm...
01:03:11
Vulnerabilities affecting code compilers What if hackers could turn back time? Ukrainian...
01:05:52
TWiET 468: Cinco de Cellular - Third party SaaS security, private mobile networks with Celona
The Justice Department is stepping up to combat ransomware and cybercrime Google and...
01:16:28
Linux and FreeBSD can be encrypted by Hive ransomware SEO Poisoning distributes ransomware...
01:10:03
Paying the ransomware piper, security spending, and is it the era of the virtual desktop?...
01:07:32
Preventing ransomware attacks when the cyber criminals are already in your network Analysis of...
01:17:36
PCIe 6.0 spec is almost complete 'FontOnLake' malware targets Linux systems Civil Cyber-Fraud...
01:17:20
Hackers stole cryptocurrency from thousands of Coinbase customers because of insecure MFA Merck...
01:11:16
Source code published for unpatched iPhone exploits Google finds new way to sneak malware past...
01:11:48
Does Adam Selipsky have to worry about the AWS exodus? OMIGOD: a new OMI vulnerability for...
01:07:46
Researchers have developed controller level SSD malware protection Most cloud vulnerabilities...
01:08:07
AI can't patent their inventions a US judge rules US Cyber Command warns of ongoing attacks on...
01:08:28
Hacker says T-Mobile's security is 'awful' Tech companies share new security efforts after...
01:03:51
TWiET 457: 5G Streetlights - No autopilots, Curt's report from BlackHat, streetlight networking
Employees offered a cut of ransomware by attackers if they infect their organization's systems...
01:03:13
Bot optimizes your PC for crypto mining Google's tool for devs to enforce security Facebook...
01:07:41
Microsoft warns of a "sneakier than usual" phishing attack Zoom is paying up for false...
01:10:48
Vultur bank-fraud malware infects thousands of devices Will the U.S. Government ban ransomware...
01:07:17
#19 En instrumentmakares historia
Episodio
对话右脑科技梁健:北大毕业,成
Episodio
Why AI Dreams of Elephants
Episodio