PodcastyTechnologiaCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Najnowszy odcinek

1743 odcink贸w

  • Cybersecurity Headlines

    Cisco's 10.0 vulnerability, Microsoft email spammed, Chrome vulnerability surge

    22.05.2026 | 8 min.
    Cisco issues 10.0 Secure Workload admin flaw warning
    Spammers abuse internal Microsoftonline account
    Google's surge in Chrome vulnerability announcements
    Get the show notes here: https://cisoseries.com/cybersecurity-news-ciscos-10-0-vulnerability-microsoft-email-spammed-chrome-vulnerability-surge/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    GitHub VS Code extension breach, Shai-Hulud npm package compromise, Huawei/Luxembourg telecom link

    21.05.2026 | 7 min.
    GitHub breach via VS Code extension
    Shai-Hulud wave compromises 600 npm packages
    Huawei attack behind Luxembourg telecom crash
    Get the show notes here: https://cisoseries.com/cybersecurity-news-github-vs-code-extension-breach-shai-hulud-npm-package-compromise-huawei-luxembourg-telecom-link/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Microsoft hits Fox Tempest, robotics OS flaw, CISA admins leaks keys

    20.05.2026 | 6 min.
    Microsoft disrupts malware-signing-as-a-service
    Critical flaw found in industrial robot OS
    CISA admin leaks keys
    Get the show notes here: https://cisoseries.com/cybersecurity-news-microsoft-hits-fox-tempest-robotics-os-flaw-cisa-admins-leaks-keys/聽
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Linus Torvalds talks AI bug hunters, 7-Eleven ransom demand, MENA's new cybercrime op

    19.05.2026 | 8 min.
    Linus Torvalds not into AI bug hunters
    7-Eleven hit with ransom demand
    MENA runs new cybercrime op
    Get the show notes here: https://cisoseries.com/cybersecurity-news-linus-torvalds-talks-ai-bug-hunters-7-eleven-ransom-demand-menas-new-cybercrime-op/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Grafan GitHub extortion, Microsoft rejects Azure report, Funnel Builder flaw

    18.05.2026 | 7 min.
    Grafana GitHub token breach leads to extortion attempt
    Microsoft rejects Azure vulnerability report, researcher disputes decision
    Funnel Builder flaw actively exploited to steal payment data
    Get the show notes here: https://cisoseries.com/cybersecurity-news-grafan-github-extortion-microsoft-rejects-azure-report-funnel-builder-flaw/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
Wi臋cej Technologia podcast贸w
O Cybersecurity Headlines
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Strona internetowa podcastu

S艂uchaj Cybersecurity Headlines, Podcast o technologii i wielu innych podcast贸w z ca艂ego 艣wiata dzi臋ki aplikacji radio.pl

Uzyskaj bezp艂atn膮 aplikacj臋 radio.pl

  • Stacje i podcasty do zak艂adek
  • Strumieniuj przez Wi-Fi lub Bluetooth
  • Obs艂uguje Carplay & Android Auto
  • Jeszcze wi臋cej funkcjonalno艣ci
Cybersecurity Headlines: Podcasty w grupie