We're an actual play D&D group who almost exclusively uses homebrew setting expansions in our games. Our game has taken us to the worlds of One Piece, Star Wars, Pokemon, and Dragon Age so far. No matter where we end up, we're just a pack of chaos goblins in pretty hats. I have no idea how the DMs stay sane.
…
continue reading
Bringin' It Backwards: podcast – giving driven musicians the invaluable insight they need to succeed in the music industry, by revealing how legendary musicians achieved stardom. Become a supporter of this podcast: https://www.spreaker.com/podcast/bringin-it-backwards--4972373/support.
…
continue reading
The power of Data is undeniable. And unharnessed - it’s nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what’s possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
…
continue reading
Social Pulse Podcast: B2B Edition is your dedicated source for conquering the unique social media marketing challenges in the B2B sector - authentically. Join award-winning marketer Mike Allton as he connects with B2B marketing professionals, uncovering the persistent obstacles they encounter and the innovative strategies they employ to overcome them. Each episode offers an in-depth look at the real-world dynamics of B2B marketing - from navigating complex sales cycles to leveraging LinkedIn ...
…
continue reading
Let’s face it: This is an unprecedented time for our democracy. Many of our government’s checks and balances are being challenged or outright ignored. We did not arrive here because of one person or one policy, but rather the erosion of numerous safeguards, which, over time, have allowed some persistent issues with our system of government to be exploited. Decisions by the U.S. Supreme Court in recent years have favored secretive political donations and restrictive voting laws, reshaping our ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Imagine how it all began, this marvelous, long journey of Humanity. Some souls work for peace and happiness. Others, though, despoil, degrade, and kill. This is a novel of past lives, reincarnation, and our occult history. Not many protohumans were alive, one and one-half million years ago, but all of us had souls, and souls persist, and there are souls which lived in hominids in Chesowanja, eastern Africa who have lived among us almost to the present day. Shimmer loves his wives, Sita and A ...
…
continue reading

1
Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Two newly disclosed critical vulnerabilities—CVE-2025-5349 and CVE-2025-5777—have put Citrix NetScaler ADC and Gateway deployments at serious risk, exposing enterprise environments to potential data breaches and service disruptions. These flaws underscore the persistent challenges facing infrastructure teams, especially when balancing security patc…
…
continue reading

1
GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Google’s Gerrit code review system—one that could have enabled attackers to infiltrate 18 of Google’s most widely used open-source projects, including Chromium, ChromiumOS, Dart, and Bazel. This episode breaks down how the vulnerability wa…
…
continue reading

1
Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilities—and the implications are serious. Cisco’s firmware flaws impact Meraki MX and Z Series devices running AnyConnect VPN. A bug in the SSL VPN process allows authenticated attackers to crash the VPN server, causing repeated d…
…
continue reading

1
Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51A deep dive into one of the most aggressive ransomware groups operating today—Play—and their latest high-profile target: Krispy Kreme. Operating since 2022, the Play ransomware group has become notorious for its double extortion model, where sensitive data is exfiltrated before systems are encrypted. Victims are pressured not just by digital ransom…
…
continue reading

1
Duolingo's Winning Data Strategy with Bilal Zia, Head of Data Science and Analytics
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05Most people know Duolingo as the fun language app with the green owl, but behind the scenes, it’s a data science team using AI and analytics to transform how we learn. In this episode, Jess Carter sits down with Bilal Zia, head of data science and analytics at Duolingo, to discuss what it takes to lead with data within one of the world’s most popul…
…
continue reading

1
Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in May 2020. With over €250 million ($290 million) in drug transactions, more than 600,000 users, and 17,000 listings, Archetyp wasn’t just another darknet forum—it was the largest dedicated drug market on…
…
continue reading

1
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare software provider. On April 1st, 2025, threat actors from the KillSec ransomware group exploited CVE-2024-41197 — a critical authentication bypass in Ocuco’s INVCLIENT.EXE — to gain Administrator-level a…
…
continue reading

1
DragonForce Ransomware: The Evolving Threat to Healthcare Data
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to increasingly devastating breaches. We begin with a close look at the rise of Ransomware-as-a-Service (RaaS), focusing on DragonForce, a ransomware group that has transitioned from politically motivated at…
…
continue reading

1
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity unicorn—and why this isn’t just another tech deal. At the core is the U.S. Department of Justice's antitrust investigation, triggered by concerns that the deal could tighten Google’s grip on a critical secto…
…
continue reading

1
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
1:03:42
1:03:42
Play later
Play later
Lists
Like
Liked
1:03:42In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) software actively leveraged by ransomware operators since early 2025. This isn't just a theoretical risk—it's already being used to compromise utility billing providers and downstream MSP customers…
…
continue reading

1
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked by Proofpoint, this campaign began in December 2024 and has since escalated, leveraging TeamFiltration, a legitimate penetration testing tool, to enumerate users and launch password spraying attacks tha…
…
continue reading
Now that everyone is well-rested, we’re ready to head back to the main camp. The only problem is that with everyone looking out for themselves, no one is really looking out for the group. And maybe there ISN’T even a group at all… Send us a text Season 1 System: We are using the One Piece homebrew by Joyful Gent and Bluebeary, which was inspired by…
…
continue reading

1
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows. We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a n…
…
continue reading

1
WestJet Cyberattack: Cracks in Aviation’s Digital Armor
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52A major cyberattack has rocked Canada's second-largest airline, WestJet—crippling internal systems and prompting warnings for customers to monitor their accounts and change passwords. But this is more than just a corporate incident. It’s the latest sign of a broader, escalating crisis in aviation cybersecurity. In this episode, we examine the WestJ…
…
continue reading

1
The People-Powered Approach to Omnichannel Marketing
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07Ever feel like your marketing efforts are scattered across too many channels with no real connection? You're not alone. In today's digital landscape, we're all trying to be everywhere at once - posting on LinkedIn, creating TikToks, sending emails, and designing in-store experiences - but rarely connecting these pieces into a cohesive strategy that…
…
continue reading

1
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance cameras—especially those manufactured in the People’s Republic of China—as a cyber weapon against U.S. critical infrastructure. Drawing from recent DHS intelligence briefings and independent cybersecurity analyse…
…
continue reading

1
Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
1:10:32
1:10:32
Play later
Play later
Lists
Like
Liked
1:10:32In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions. Promoted as a “responsible alternative” to the NSO Group’s Pegasus, Graphite is now implicated in the surveillance of journalists, humanitarian activists, and civil society figures—contrary to the ve…
…
continue reading

1
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51zeroRISC just raised $10 million to bring OpenTitan—the first open-source silicon Root of Trust—to market. In this episode, we break down what this funding means for the future of supply chain security, and why investors are betting on open hardware to fix vulnerabilities baked into modern chips. We explore how geopolitical tension, forced labor en…
…
continue reading

1
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42The financial services industry is under siege. In this episode, we unpack the latest findings from Radware’s 2025 Financial Threat Analysis and multiple intelligence reports detailing a relentless rise in cyberattacks targeting banks and financial institutions across the globe. We examine the surge in sophisticated attacks that blend legitimate to…
…
continue reading

1
9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore. We spotlight the most…
…
continue reading

1
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attackers are exploiting these flaws in the wild. Recently, security researchers uncovered a trio of dangerous vulnerabilities, including CVE-2024-35286 (a SQL injection flaw), CVE-2024-41713 (an authentic…
…
continue reading

1
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercriminal world between January and April 2025. Led by INTERPOL and involving law enforcement from 26 countries, primarily across the Asia-Pacific region, this massive coordinated effort, bolstered by cri…
…
continue reading

1
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
…
continue reading
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal data of over 423,000 individuals. In this episode, we take a forensic look at what went wrong, how one compromised account enabled unauthorized downloads of sensitive crash data, and what this means …
…
continue reading

1
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this episode, we dive deep into the alarming rise of financial aid fraud in U.S. higher education, driven by "ghost students" and increasingly sophisticated scams powered by AI. From fraud rings applying for…
…
continue reading

1
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
…
continue reading

1
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
…
continue reading

1
UNFI Breach: How One Cyberattack Shook the North American Food Supply
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
…
continue reading
After realizing that they may have released a sentient ball of energy from captivity, or driven the Maker from his home, or somehow caused the end of the world, everyone is a little on edge. There’s not much for us to do right now besides finish exploring this temple and then rest for the night… Send us a text Season 1 System: We are using the One …
…
continue reading

1
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise developers, gamers, and even rival hackers. By abusing GitHub’s search functionality and reputation signals, threat actors are pushing backdoored code under the guise of popular tools, game cheats, and …
…
continue reading

1
ClickFix: How Fake Browser Errors Became the Internet’s Most Dangerous Trap
47:15
47:15
Play later
Play later
Lists
Like
Liked
47:15In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFake—a highly effective and deceptive malware delivery tactic that emerged in early 2024. ClickFix exploits the human tendency to trust browser prompts by using fake error messages, CAPTCHA pages, and verification requests to convince users to execute malicious PowerShell…
…
continue reading

1
Exposed and Extorted: The ViLE Hackers and the Legal Gaps Enabling Doxing
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Cybercrime is rapidly evolving—and so are its tactics. In this episode, we dissect the findings of SoSafe’s Cybercrime Trends 2025 report and explore the six key trends reshaping the global threat landscape, including AI as an attack surface, multichannel intrusions, and the rising exploitation of personal identities. But we don’t stop at theory. W…
…
continue reading

1
Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
…
continue reading

1
Australia Forces Transparency: The World’s First Mandatory Ransomware Payment Reporting Law
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
…
continue reading

1
$25M for AI Email Security: Trustifi’s Big Bet on the MSP Market
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
…
continue reading

1
Southwest Airlines on Making AI Work Across the Enterprise
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02AI can feel abstract until it’s tied to something real. At Southwest Airlines, it’s used to improve flight operations, support frontline staff, and help leaders make faster decisions. In this episode, Jess Carter chats with Justin Bundick, managing director of artificial intelligence at Southwest Airlines. He shares how the airline built an AI stra…
…
continue reading

1
Google Chrome vs. Failing CAs: The Policy Behind the Distrust
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
…
continue reading
We had the pleasure of interviewing Lyn Lapid over Zoom video! Gold-Certified singer, songwriter, and multi-instrumentalist Lyn Lapid releases her long-awaited debut album, BUZZKILL, via Mercury Records—listen HERE. The 12-track album features her recently released singles “death wish,” “i’ll be happy when,” “coraline” and “buttons,” as well as the…
…
continue reading

1
CVE-2025-48827 & 48828: How vBulletin’s API and Template Engine Got Weaponized
1:35:55
1:35:55
Play later
Play later
Lists
Like
Liked
1:35:55Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
…
continue reading

1
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
…
continue reading

1
Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598
16:11
16:11
Play later
Play later
Lists
Like
Liked
16:11In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
…
continue reading
Calpernia and Serel’s curiosity about the ancient world have led the group into what remains of a city far older than anything in the Tevinter Imperium. Unfortunately, figuring out how to activate the device in their library is proving quite difficult without knowing the language… Send us a text Season 1 System: We are using the One Piece homebrew …
…
continue reading

1
Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
…
continue reading

1
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
…
continue reading

1
Video Content Multiplication: AI Strategies from Video Marketing Expert Justin Brown
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42Are you struggling to produce enough video content to meet your B2B marketing goals? You know video is essential for engagement, but the production process is slowing you down. You've got ideas, but limited time, resources, and perhaps technical know-how to bring them all to life. How many potential leads are you missing because that product demo o…
…
continue reading

1
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
…
continue reading

1
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
…
continue reading

1
Unbound Raises $4M to Secure Generative AI in the Enterprise
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
…
continue reading

1
Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
…
continue reading

1
Systemd as a Weapon: How PumaBot Exploits Linux Persistence
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
…
continue reading