Artwork

Content provided by Wiz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wiz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#13 - Leaky CLIs, glitchy CPUs and risky HARs

23:24
 
Share
 

Manage episode 386787182 series 3458076
Content provided by Wiz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wiz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

🎙️ NEW PODCAST EPISODE ALERT! Eden and Amitai are back with another wild ride through the cloudy skies on "Crying Out Cloud"! Here's the scoop for today's adventure: 01:36 - Okta Support System Compromise: 🕵️‍♂️ We unravel the mystery surrounding an unknown threat actor's access to Okta's customer support system. What's an HAR file, and why should you care?

06:30 - Azure CLI Credential Leak (CVE-2023-36052): 💻 Get the lowdown on Microsoft's Azure CLI vulnerability and how this leak happened, why defaults matter, and what the patch means for your Azure CLI setup.

13:17 - Reptar and Cachewarp CPU Vulnerabilities: 💡 CPU vulnerabilities are a trend we can't ignore! Discover why Reptar and Cachewarp CPU vulnerabilities might sound daunting but aren't necessarily the cloud apocalypse. Plus, the juicy details on who's patched and who's snoozing on this issue

Links:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052
https://cloud.google.com/blog/products/identity-security/google-researchers-discover-reptar-a-new-cpu-vulnerability
https://lock.cmpxchg8b.com/reptar.html
https://cachewarpattack.com/
https://sec.okta.com/harfiles

  continue reading

48 episodes

Artwork
iconShare
 
Manage episode 386787182 series 3458076
Content provided by Wiz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wiz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

🎙️ NEW PODCAST EPISODE ALERT! Eden and Amitai are back with another wild ride through the cloudy skies on "Crying Out Cloud"! Here's the scoop for today's adventure: 01:36 - Okta Support System Compromise: 🕵️‍♂️ We unravel the mystery surrounding an unknown threat actor's access to Okta's customer support system. What's an HAR file, and why should you care?

06:30 - Azure CLI Credential Leak (CVE-2023-36052): 💻 Get the lowdown on Microsoft's Azure CLI vulnerability and how this leak happened, why defaults matter, and what the patch means for your Azure CLI setup.

13:17 - Reptar and Cachewarp CPU Vulnerabilities: 💡 CPU vulnerabilities are a trend we can't ignore! Discover why Reptar and Cachewarp CPU vulnerabilities might sound daunting but aren't necessarily the cloud apocalypse. Plus, the juicy details on who's patched and who's snoozing on this issue

Links:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052
https://cloud.google.com/blog/products/identity-security/google-researchers-discover-reptar-a-new-cpu-vulnerability
https://lock.cmpxchg8b.com/reptar.html
https://cachewarpattack.com/
https://sec.okta.com/harfiles

  continue reading

48 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play