Trending Misterio
iVoox
Descargar app Subir
iVoox Podcast & radio
Descargar app gratis
Overkill Security
Overkill Security
Podcast

Overkill Security 6j3731

71
0

Because Nothing Says 'Security' Like a Dozen Firewalls and a Biometric Scannerhttps://t.me/+li0tDAgOYDNkZTBhhttps://boosty.to/overkill_security 6n303o

Because Nothing Says 'Security' Like a Dozen Firewalls and a Biometric Scannerhttps://t.me/+li0tDAgOYDNkZTBhhttps://boosty.to/overkill_security

71
0
From IDE to IDK. How JetBrains Became a Playground for Cyber Intruders
From IDE to IDK. How JetBrains Became a Playground for Cyber Intruders
This document provides aт analysis of the Exploiting JetBrains TeamCity CVE advisory, as detailed in the Defense.gov publication. The analysis delves into various critical aspects of cybersecurity, focusing on the exploitation of CVEs to gain initial access to networks, deployment of custom malware.This analysis serves as a valuable resource for cybersecurity professionals, software developers, and stakeholders in various industries, offering a detailed understanding of the tactics, techniques, and procedures (TTPs) employed by cyber actors. By providing a qualitative summary of the advisory, this document aims to enhance the cybersecurity posture of organizations, enabling them to better protect against similar threats and contribute to the collective defense against state-sponsored cyber espionage activities. Full content (all-in-one episodes)
Internet y tecnología 8 meses
0
0
0
25:03
JetBrains. Edge Sword of Software Development II
JetBrains. Edge Sword of Software Development II
A non-obvious view of the benefits and drawbacks of using JetBrains related to cyber actors and NSA
Internet y tecnología 8 meses
0
0
0
02:19
JetBrains. Edge Sword of Software Development
JetBrains. Edge Sword of Software Development
A balanced view of the benefits and drawbacks of using JetBrains tools, highlighting the security risks alongside their functionality.
Internet y tecnología 8 meses
0
0
0
01:29
JetBrains. The Unofficial Contributor to MITRE ATT&CK
JetBrains. The Unofficial Contributor to MITRE ATT&CK
How JetBrains vulnerabilities enriched the MITRE ATT&CK framework, providing new tactics and techniques for attackers.
Internet y tecnología 8 meses
0
0
0
01:55
JetBrains. A Hacker's Best Friend
JetBrains. A Hacker's Best Friend
How JetBrains vulnerabilities became essential tools in the adversary's arsenal, much to CISA's dismay.
Internet y tecnología 8 meses
0
0
0
01:48
JetBrains. The Lateral Movement Express
JetBrains. The Lateral Movement Express
An examination of how JetBrains vulnerabilities enabled swift lateral movement across networks, with CISA struggling to keep up.
Internet y tecnología 8 meses
0
0
0
01:10
JetBrains. Digging Tunnels in Cybersecurity
JetBrains. Digging Tunnels in Cybersecurity
How JetBrains vulnerabilities facilitated tunneling into compromised environments, with CISA left to fill in the gaps.
Internet y tecnología 8 meses
0
0
0
01:16
JetBrains. Network Exploration Made Easy
JetBrains. Network Exploration Made Easy
A look at how JetBrains vulnerabilities simplified network reconnaissance for attackers, much to CISA's frustration.
Internet y tecnología 8 meses
0
0
0
01:13
JetBrains. The Unofficial Data Courier
JetBrains. The Unofficial Data Courier
How JetBrains vulnerabilities turned sensitive data into a traveler without a destination, with CISA left to pick up the pieces.
Internet y tecnología 8 meses
0
0
0
01:15
The Art of Staying Put. JetBrains Edition
The Art of Staying Put. JetBrains Edition
An analysis of how attackers used JetBrains vulnerabilities to maintain persistence, with CISA's attempts to evict them proving challenging.
Internet y tecnología 8 meses
0
0
0
01:01
JetBrains. Elevating Privileges Since 2024
JetBrains. Elevating Privileges Since 2024
How JetBrains vulnerabilities offered hackers a free status, much to the dismay of CISA.
Internet y tecnología 8 meses
0
0
0
00:46
JetBrains. Masters of Disguise or Not
JetBrains. Masters of Disguise or Not
An exploration of the tactics used by attackers to avoid detection, exploiting JetBrains' vulnerabilities while CISA played catch-up.
Internet y tecnología 8 meses
0
0
0
01:44
SQL Servers. JetBrains' Unwanted Guests
SQL Servers. JetBrains' Unwanted Guests
JetBrains vulnerabilities sparked an unexpected interest in SQL servers, turning them into the hottest party spots for cyber intruders.
Internet y tecnología 8 meses
0
0
0
01:08
Data's Great Escape. A JetBrains Tale
Data's Great Escape. A JetBrains Tale
The story of how JetBrains vulnerabilities facilitated the grand exfiltration of sensitive files, with CISA desperately trying to catch the runaway data.
Internet y tecnología 8 meses
0
0
0
01:02
JetBrains' Unintentional Tour Guide
JetBrains' Unintentional Tour Guide
A deep dive into how JetBrains' flaws turned host reconnaissance into a guided tour for hackers, with CISA scrambling to close the exits.
Internet y tecnología 8 meses
0
0
0
01:17
JetBrains' Open-Door Policy
JetBrains' Open-Door Policy
How JetBrains' vulnerabilities provided cybercriminals with a VIP to systems worldwide, much to CISA's chagrin.
Internet y tecnología 8 meses
0
0
0
00:50
Lessons in Security. JetBrains Edition
Lessons in Security. JetBrains Edition
Key takeaways from the JetBrains saga: Always patch your software, and never underestimate the power of a well-timed CISA advisory.
Internet y tecnología 8 meses
0
0
0
01:44
Welcome to the JetBrains Security Circus
Welcome to the JetBrains Security Circus
An introduction to the thrilling world of JetBrains vulnerabilities, where every bug is a new act, and CISA plays the role of the reluctant ringmaster.
Internet y tecnología 8 meses
0
0
0
01:13
[Trailer] JetBrains. When Security Takes a Coffee Break
[Trailer] JetBrains. When Security Takes a Coffee Break
A humorous look at how JetBrains' vulnerabilities became the cybersecurity equivalent of leaving your front door wide open. CISA's recommendations? Just a polite reminder to lock it.
Internet y tecnología 8 meses
0
0
0
00:50
Cloud Infiltration. How Cyber Actors Adapt and Overcome
Cloud Infiltration. How Cyber Actors Adapt and Overcome
This content provides an overview of how cyber actors adapt and overcome security measures to infiltrate cloud environments, emphasizing the need for continuous vigilance and adaptation in cybersecurity strategies.
Internet y tecnología 8 meses
0
0
0
44:09
También te puede gustar Ver más
xHUB.AI
xHUB.AI En la era de la Inteligencia Artificial, la aplicación en cualquier escenario supone el mayor debate y más importante para el ser humano y su futuro.En el podcast de xHUB.AI hablamos sobre inteligencia artificial y otras ciencias transversales, su aplicación a diferentes sectores y soluciones, con los mejores speakers y especialistas.La Inteligencia Artificial cambiará el mundo y nosotros queremos contartelo.Te lo vas a perder? Actualizado
Somos Eléctricos
Somos Eléctricos Podcast diario dedicado a difundir y a dar a conocer el mundo de los vehículos eléctricos. En estos podcasts te hablamos de las últimas novedades del sector además de compartir, debatir y opinar sobre distintos temas referentes a los coches eléctricos, energía sostenible y tecnología aplicada a los vehículos. Finalmente también usamos esta plataforma de podcast para resolver dudas o dar respuesta a las preguntas de nuestros oyentes. Actualizado
Red de Sospechosos Habituales
Red de Sospechosos Habituales Todos los capítulos de los podcasts asociados a la red Sospechosos Habituales unidos en este único feed Actualizado
Ir a Internet y tecnología