In this season of Amidst the Ordinary, we talk about community and connection. This innately human urge to be a part of something – to feel seen, heard, and valued by those around us. With stories from small towns in Georgia to the heart of the UAE and countless places in between. We’re here to tell stories, real stories, from real people. We’ll reflect on these stories together, discuss how they inspired us, and discover practical ways to apply them to our lives. Whether you move to a new c ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Welcome to Chromatography Life, a podcast presented by Waters Corporation. Join us as we dive into the world of chromatography with leading scientists to examine today’s critical challenges. As a hub for the chromatography community, we share the lived experiences, passions, and visions of these scientific innovators as they shape the future of analytical chemistry. Hear from experts across a wide range of topics, spanning chromatographic methods, laboratory solutions, column chemistry, and ...
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
Step back into a world of intrigue, passion, and ruthless ambition — welcome to Tudor England. Join historian and bestselling author Claire Ridgway as she uncovers the riveting stories of the Tudor dynasty. From the scandalous love affairs of King Henry VIII to the tragic fall of Anne Boleyn, the fierce reign of Elizabeth I, and the lesser-known secrets of Tudor court life, this podcast brings history to life in vivid detail. Hear dramatic tales of betrayal, execution, forbidden love, and po ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A podcast highlighting Women in STEM, especially Women of Color. The STEM Lab Podcast is hosted by Dr. Sabrina Walthall a scientist/professor whose love for STEM (science, technology, engineering, and math) eventually led to a STEM career in academia. Dr. Walthall is an Associate Professor of Science, a Community Engagement Scientist and an advocate for women in STEM.
…
continue reading
Earth Body Mind Spirit is a podcast about the new world that we all need to create together to save our home the Earth and to help each one of us live a deeply fulfilling and rich life in the process.
…
continue reading

1
The Wind That Saved England: How the Spanish Armada Was Scattered
3:26
3:26
Play later
Play later
Lists
Like
Liked
3:26Storms at sea. Panic at court. And a queen under guard. On this day in Tudor history — 30th July 1588 — England’s fate shifted with the wind. The once-mighty Spanish Armada, already damaged by the Battle of Gravelines, was now scattered and driven northwards by violent storms. Many in England saw it as divine intervention — a “Protestant Wind” sent…
…
continue reading

1
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading
He didn’t wear a crown… but his choice may have changed the course of English history. On 29th July 1504, Thomas Stanley, 1st Earl of Derby, died quietly at his manor in Lancashire. But nearly two decades earlier, at the bloody Battle of Bosworth, his decision to support his stepson — Henry Tudor — was a turning point in English history, ending cen…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading

1
The Forgotten Tudor Wife Who Drank Her Own Urine to Survive - TUDOR TRUE CRIME
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Starved. Poisoned. Locked in a castle tower. In Tudor England, one woman endured unthinkable cruelty at the hands of her noble husband—imprisoned in a tower, reduced to drinking her own urine to survive, and desperate enough to smuggle a secret letter to Thomas Cromwell begging for rescue. Her name was Elizabeth Hungerford. Her husband? Walter Hung…
…
continue reading

1
The Tiny Tudor Ship That Crossed the Atlantic
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07What if I told you that England’s very first official voyage of exploration to the New World didn’t begin in London—or even under an Englishman’s command? Join me, Claire Ridgway, historian and author, as I tell you about "The Matthew", the tiny replica ship moored in Bristol that once carried explorer John Cabot (Giovanni Caboto) across the Atlant…
…
continue reading

1
The Colour of Darkness - Claire Interviews author Toni Mount
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04Join me, Claire Ridgway, as I sit down with historian and bestselling author Toni Mount to celebrate the release of The Colour of Darkness — book 13 in the gripping Sebastian Foxley Medieval Mystery series. In this fascinating interview, Toni Mount takes us behind the scenes of her writing process, research into 15th-century London, and the creatio…
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading
Imagine stepping into court expecting justice… and instead walking into a death sentence. On this day in Tudor history, 25th July 1577, Queen Elizabeth I’s top lawyer, Nicholas Barham, died in Oxford—not by blade or betrayal, but from a silent, invisible killer: gaol fever. Within weeks, over 500 people were dead, including judges, jurors, sheriffs…
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading
The Tragic Martyrdom of John Boste - They wouldn’t even let him speak. On this day in Tudor history, 24th July 1594, Catholic priest John Boste stood on the scaffold in Durham, condemned for treason simply for doing his job — ministering in secret during Elizabeth I’s reign. When guards silenced his final words, Boste prayed Psalm 116 in Latin inst…
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading

1
New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
…
continue reading

1
Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months after a major international takedown. Despite Microsoft, the FBI, Europol, and global partners dismantling over 2,500 malicious domains and seizing critical infrastructure in May 2025, Lumma Stealer has …
…
continue reading

1
New SharePoint Flaw, How Cybercriminals Use AI
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34) LameHug AI-Powered Malware (5:55) UK Bans Ransomware Payments (9:44) AI Tactics Behind the Latest Cyber Threats (14:11) Kim B…
…
continue reading

1
Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Cisco’s Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC), prompting urgent patching directives from the company. The flaws — CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337 — each carry a maximum CVSS severity score of 10.0, indicating the highe…
…
continue reading

1
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) allowing unauthenticated remote code execution and identity control bypass. First observed in high-value targets across government, critical infrastructure, and manufacturing…
…
continue reading

1
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand unpatched servers globally. This severe security flaw—caused by improper validation in the AS2 protocol—has exposed enterprise-managed file transfer (MFT) systems across the US, Europe, and Canada. Se…
…
continue reading

1
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cybercrime group known as World Leaks—a rebrand of the former Hunters International gang—has claimed responsibility for breaching Dell’s Customer Solution Centers (CSC), a sandbox environment used primaril…
…
continue reading

1
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into production software. This episode dives into how a debug configuration error allowed Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ real IP addresses and compromis…
…
continue reading

1
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S. customers—including names, addresses, and even Social Security and passport numbers. Although payment data remained secure, the incident's impact is substantial, both in terms of customer trust and c…
…
continue reading
John Scrope, 5th Baron Scrope of Bolton This Tudor baron backed the losing side again and again… and still kept his head. Today, I’m exploring the incredible life of John Scrope, 5th Baron Scrope of Bolton — a nobleman who seemed to have nine lives. He fought at Towton, rebelled against Edward IV, supported Richard III, backed the pretender Lambert…
…
continue reading

1
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is taking a bold stand. Backed by $5.2 million in seed funding from Sorenson Capital and others, the company is pioneering a radically new approach to cybersecurity with its AI-native platform TRACE (Thr…
…
continue reading

1
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
1:03:29
1:03:29
Play later
Play later
Lists
Like
Liked
1:03:29In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack…
…
continue reading

1
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders. The method? Tampering with the IMSI fi…
…
continue reading

1
Tudor Money Explained – Elizabeth I’s Bold Coin Reform & Tower Mint Secrets
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51What if your everyday coins could get you executed? On this day in Tudor history, 10th July 1561, Queen Elizabeth I visited the Tower of London’s Mint — not just for ceremony, but to tackle an economic disaster left by her father and brother. In this deep dive, I explore: - The shocking chaos of debased Tudor currency - How Elizabeth I’s smart reco…
…
continue reading

1
When Spain Came to England: Philip of Spain’s Grand Arrival
11:33
11:33
Play later
Play later
Lists
Like
Liked
11:3312,000 soldiers. 300+ servants. Fireworks. Tapestries. Jewels.* On this day in Tudor history, 20th July 1554, Prince Philip of Spain landed in England to marry Queen Mary I — and he didn’t exactly travel light! I’m Claire Ridgway, historian and author, and in today’s video I’m taking you behind the scenes of one of the most politically charged roya…
…
continue reading

1
Mark Smeaton - the Queen's Musician - Claire Interviews Martha Johnson
41:10
41:10
Play later
Play later
Lists
Like
Liked
41:10What if Mark Smeaton—the lowly court musician caught up in the deadly fall of Anne Boleyn—had a voice of his own? In this special interview, I chat with historical fiction author Martha Jean Johnson, whose novel "The Queen’s Musician" retells the tragic final months of Anne Boleyn’s life through the eyes of the man history forgot. We talk about wha…
…
continue reading

1
Tudor True Crime – The Shocking Murder of Thomas Arden
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23Poisoned Milk, a Pressing Iron… and Murder in the Parlour? Welcome to the very first episode of Tudor True Crime – where real historical crimes are darker than fiction. In 1551, respected businessman Thomas Arden of Faversham was brutally murdered. But the killer wasn’t a stranger… It was his own wife, Alice Arden, along with her lover and a gang o…
…
continue reading

1
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30In June 2025, United Natural Foods, Inc. (UNFI)—the primary distributor for Whole Foods and tens of thousands of retailers across North America—suffered a major cyberattack that halted deliveries, emptied shelves, and forced core operations offline. The financial damage? Between $350 and $400 million in net sales lost, and up to $60 million in redu…
…
continue reading

1
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing out—this time in Delaware’s Chancery Court, where Mark Zuckerberg and Meta executives are being sued by investors seeking over $8 billion in damages. This landmark class-action lawsuit argues that Meta’s leadership knowingly violated a…
…
continue reading

1
Operation Eastwood: Inside the Takedown of NoName057(16)
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency i…
…
continue reading

1
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members. No financial data was taken, but the attack hit at the core of trust, with CEO Shirine Khoury-Haq calling it a “personal attack on our members and colleagues.” This wasn’t just a technical failure—it was a…
…
continue reading
They never really left — they just got quieter, faster, and bolder. In this episode of the Adversary Universe podcast, Adam and Cristian trace the resurgence of SCATTERED SPIDER, one of today’s most aggressive and sophisticated adversary groups. Once known for SIM swapping and gaming community exploits, SCATTERED SPIDER has evolved into a high-spee…
…
continue reading

1
Royal Revenge? Why Lady Glamis Was Really Burnt at the Stake
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23On this day in Tudor history — 17th July 1537 — Janet Douglas, Lady Glamis, was dragged to Castle Hill in Edinburgh and burned at the stake. The charge? Treason. The truth? Far more sinister. She was a noblewoman. A widow. A Douglas. And that last detail may have sealed her fate. Accused of plotting to poison King James V of Scotland, Lady Glamis w…
…
continue reading

1
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard tricks (like ClickFix) to an even more covert social engineering technique that abuses Windows File Explorer’s address bar to execute malicious code without triggering security prompts or downloads. …
…
continue reading

1
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently redirect victims to malicious websites, without requiring file downloads, macros, or even user clicks. In this episode, we break down how attackers are exploiting the JavaScript-capable structure of Scal…
…
continue reading

1
Do You Really Need IOCs? Plus Zero-Day Exploits, AI Data Leaks, and Phishing for VIPs
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
…
continue reading