How are attackers using malicious drivers in Windows to stay undetected?

How are attackers using malicious drivers in ...

‏التالي

The trust paradox: How attackers weaponize legitimate SaaS platforms

In this episode of Talos Takes, Amy Ciminnisi sits down with researcher Diana Brown to discuss the rise of "platform-as-a-proxy" (PAP) attacks. We explore how threat actors are weaponizing legitimate SaaS platforms like GitHub and Jira to deliver phishing campaigns that bypass tr ...  عرض المزيد

It's not you, it's your printer: State-sponsored and phishing threats in 2025

In this episode, we unpack state-sponsored and phishing trends from the 2025 Talos Year in Review. Amy and Martin Lee explore the alarming rise of internal phishing campaigns that bypass traditional perimeter defenses, including the widespread weaponization of Microsoft 365's Dir ...  عرض المزيد

‏حلقات موصى بها

Episode 85: Practical Applications of DEFCON 32 Web Research
Critical Thinking - Bug Bounty Podcast

Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus w ...  عرض المزيد

A tale of two botnets. [Research Saturday]
CyberWire Daily

This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in W ...  عرض المزيد

PP021: Critical Vulnerabilities, AI-Assisted Scams, Compromised VPNs, and More Security News
Packet Protector

It’s an all-news episode for this week’s Packet Protector podcast. We cover critical vulnerabilities in the MOVEit file transfer software and in thousands of ASUS routers, and a remote code execution vulnerability in a Windows wireless driver that you really should patch. We disc ...  عرض المزيد

Triofox and the key to disaster. [Research Saturday]
CyberWire Daily

This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gl ...  عرض المزيد