Artwork

Content provided by Automox. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Automox or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Patch [FIXED] Tuesday – The Vulnerabilities That Defined 2024

1:13:19
 
Share
 

Manage episode 458322633 series 3528713
Content provided by Automox. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Automox or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Join us for a special bonus episode of Patch [FIX] Tuesday, an hour-long compilation of the vulnerabilities that help shaped the cybersecurity landscape in 2024.

This episode recaps some the most critical and interesting exploits, from supply chain compromises to elevation of privilege threats targeting widely used platforms. Whether you're an IT administrator, security professional, or tech enthusiast, this episode provides valuable insights to stay ahead of evolving threats.

Here’s a list of vulnerabilities discussed in this episode, and be sure to tune into the Patch [FIX] Tuesday podcast on the second Tuesday of every month.

  1. Operation Triangulation (00:13)
  2. CVE-2024-21401: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability (5:00)
  3. CVE-2024-21400: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability (11:00)
  4. CVE-2024-3094: XZ/Liblzma Supply Chain Backdoor (17:08)
  5. CVE-2024-4671: Google Chrome Use-After-Free Vulnerability (30:00)
  6. CVE-2024-30078: Windows WiFi Driver Remote Code Execution Vulnerability(35:03)
  7. CVE-2024-38053: Windows Layer Two Bridge Network RCE (47:14)
  8. CVE-2024-38180: SmartScreen Prompt Remote Code Execution Vulnerability (53:12)
  9. CVE-2024-43491: Microsoft Windows Update Remote Code Execution Vulnerability (1:00:00)
  10. CVE-2024-43533: Remote Desktop Client Remote Code Execution Vulnerability (1:04:24)
  11. CVE-2024-5535: Microsoft Defender for Endpoint Remote Code Execution Vulnerability (1:07:35)
  12. CVE-2024-49093: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability (1:09:36)
  continue reading

137 episodes

Artwork
iconShare
 
Manage episode 458322633 series 3528713
Content provided by Automox. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Automox or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Join us for a special bonus episode of Patch [FIX] Tuesday, an hour-long compilation of the vulnerabilities that help shaped the cybersecurity landscape in 2024.

This episode recaps some the most critical and interesting exploits, from supply chain compromises to elevation of privilege threats targeting widely used platforms. Whether you're an IT administrator, security professional, or tech enthusiast, this episode provides valuable insights to stay ahead of evolving threats.

Here’s a list of vulnerabilities discussed in this episode, and be sure to tune into the Patch [FIX] Tuesday podcast on the second Tuesday of every month.

  1. Operation Triangulation (00:13)
  2. CVE-2024-21401: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability (5:00)
  3. CVE-2024-21400: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability (11:00)
  4. CVE-2024-3094: XZ/Liblzma Supply Chain Backdoor (17:08)
  5. CVE-2024-4671: Google Chrome Use-After-Free Vulnerability (30:00)
  6. CVE-2024-30078: Windows WiFi Driver Remote Code Execution Vulnerability(35:03)
  7. CVE-2024-38053: Windows Layer Two Bridge Network RCE (47:14)
  8. CVE-2024-38180: SmartScreen Prompt Remote Code Execution Vulnerability (53:12)
  9. CVE-2024-43491: Microsoft Windows Update Remote Code Execution Vulnerability (1:00:00)
  10. CVE-2024-43533: Remote Desktop Client Remote Code Execution Vulnerability (1:04:24)
  11. CVE-2024-5535: Microsoft Defender for Endpoint Remote Code Execution Vulnerability (1:07:35)
  12. CVE-2024-49093: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability (1:09:36)
  continue reading

137 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play