Artwork

ืชื•ื›ืŸ ืžืกื•ืคืง ืขืœ ื™ื“ื™ James Azar. ื›ืœ ืชื•ื›ืŸ ื”ืคื•ื“ืงืืกื˜ื™ื ื›ื•ืœืœ ืคืจืงื™ื, ื’ืจืคื™ืงื” ื•ืชื™ืื•ืจื™ ืคื•ื“ืงืืกื˜ื™ื ืžื•ืขืœื™ื ื•ืžืกื•ืคืงื™ื ื™ืฉื™ืจื•ืช ืขืœ ื™ื“ื™ James Azar ืื• ืฉื•ืชืฃ ืคืœื˜ืคื•ืจืžืช ื”ืคื•ื“ืงืืกื˜ ืฉืœื”ื. ืื ืืชื” ืžืืžื™ืŸ ืฉืžื™ืฉื”ื• ืžืฉืชืžืฉ ื‘ื™ืฆื™ืจื” ืฉืœืš ื”ืžื•ื’ื ืช ื‘ื–ื›ื•ื™ื•ืช ื™ื•ืฆืจื™ื ืœืœื ืจืฉื•ืชืš, ืืชื” ื™ื›ื•ืœ ืœืขืงื•ื‘ ืื—ืจ ื”ืชื”ืœื™ืš ื”ืžืชื•ืืจ ื›ืืŸ https://he.player.fm/legal.
Player FM - ืืคืœื™ืงืฆื™ื™ืช ืคื•ื“ืงืืกื˜
ื”ืชื—ืœ ื‘ืžืฆื‘ ืœื ืžืงื•ื•ืŸ ืขื ื”ืืคืœื™ืงืฆื™ื” Player FM !

๐Ÿšจ Jenkins Bug Exploit Still Active, Github Authentication Flaw, Post Quantum Crypto Deep Dive

15:58
 
ืฉืชืคื•
 

Manage episode 435576375 series 3445341
ืชื•ื›ืŸ ืžืกื•ืคืง ืขืœ ื™ื“ื™ James Azar. ื›ืœ ืชื•ื›ืŸ ื”ืคื•ื“ืงืืกื˜ื™ื ื›ื•ืœืœ ืคืจืงื™ื, ื’ืจืคื™ืงื” ื•ืชื™ืื•ืจื™ ืคื•ื“ืงืืกื˜ื™ื ืžื•ืขืœื™ื ื•ืžืกื•ืคืงื™ื ื™ืฉื™ืจื•ืช ืขืœ ื™ื“ื™ James Azar ืื• ืฉื•ืชืฃ ืคืœื˜ืคื•ืจืžืช ื”ืคื•ื“ืงืืกื˜ ืฉืœื”ื. ืื ืืชื” ืžืืžื™ืŸ ืฉืžื™ืฉื”ื• ืžืฉืชืžืฉ ื‘ื™ืฆื™ืจื” ืฉืœืš ื”ืžื•ื’ื ืช ื‘ื–ื›ื•ื™ื•ืช ื™ื•ืฆืจื™ื ืœืœื ืจืฉื•ืชืš, ืืชื” ื™ื›ื•ืœ ืœืขืงื•ื‘ ืื—ืจ ื”ืชื”ืœื™ืš ื”ืžืชื•ืืจ ื›ืืŸ https://he.player.fm/legal.

๐Ÿšจ Jenkins Bug Exploit Still Active, Github Authentication Flaw, Post Quantum Crypto Deep Dive

๐ŸŽ™๏ธ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners

Todayโ€™s episode will discuss the latest news as Jenkins struggles to patch an active exploit with more news below:

  • Github authentication flaw
  • Microsoft Co-Pilot Leaks Information
  • A Post Quantum Cryptography Deep Dive with Kloch Founder

For more information, please visit our website: https://www.cyberhubpodcast.com/

๐Ÿ‘€ SHOW Supporters:

Todayโ€™s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

โœ… Story Links:

https://www.darkreading.com/vulnerabilities-threats/critical-actively-exploited-jenkins-rce-bug-patch-lag

https://www.securityweek.com/critical-authentication-flaw-haunts-github-enterprise-server/

https://www.securityweek.com/why-linkedin-developed-its-own-ai-powered-security-platform/

https://www.bleepingcomputer.com/news/security/google-fixes-tenth-actively-exploited-chrome-zero-day-in-2024/

https://www.fierceelectronics.com/electronics/post-quantum-cryptography-standards-published-whats-next

https://www.securityweek.com/microsoft-copilot-studio-vulnerability-led-to-information-disclosure/

https://www.securityweek.com/new-phishing-technique-bypasses-security-on-ios-and-android-to-steal-bank-credentials/

https://www.bleepingcomputer.com/news/legal/man-sentenced-for-hacking-state-registry-to-fake-his-own-death/

https://therecord.media/moscow-detains-scientist-ddos-ukraine

๐Ÿ”” Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1

โœ… Important Links to Follow:

๐Ÿ‘‰Substack: http://jamesazar.substack.com

๐Ÿ‘‰Listen here: https://linktr.ee/cyberhubpodcast

โœ… Stay Connected With Us.

๐Ÿ‘‰Facebook: https://www.facebook.com/CyberHubpodcast/

๐Ÿ‘‰LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/

๐Ÿ‘‰Twitter (X): https://twitter.com/cyberhubpodcast

๐Ÿ‘‰Instagram: https://www.instagram.com/cyberhubpodcast

โœ… For Business Inquiries: info@cyberhubpodcast.com

=============================

โœ… Other Videos You Might Be Interested in Watching:

๐Ÿ‘‰ The Unstoppable Rise of AI and the Never Ending Hype

https://youtube.com/shorts/DNPrsK8GNgM?feature=share

๐Ÿ‘‰ A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS

https://www.youtube.com/watch?v=Xth4WIk1kYc

๐Ÿ‘‰ The Latest on the MGM Resorts Ransomware Attack & its impact on Vegas and Cybersecurity overall

https://www.youtube.com/watch?v=T7IyvVSj8FY

๐Ÿ‘‰ What Does Omer Adam & Tel Aviv have to do with Cybersecurity? Find out on CISO Talk

https://www.youtube.com/watch?v=xBJDDN8djU0

๐Ÿ‘‰ Unveiling the Biggest Misconception in SaaS Security

https://youtube.com/shorts/lv-v9FeNamU

=============================

โœ… About The CyberHub Podcast.

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content thatโ€™s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

For Collaboration and Business inquiries, please use the contact information below:


๐Ÿ“ฉ Email: info@cyberhubpodcast.com


๐Ÿ”” Make sure to subscribe and follow us on your favorite podcast-listening platform.

https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1


=================================


#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews


Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.


Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.


ยฉ The CyberHub Podcast

  continue reading

300 ืคืจืงื™ื

Artwork
iconืฉืชืคื•
 
Manage episode 435576375 series 3445341
ืชื•ื›ืŸ ืžืกื•ืคืง ืขืœ ื™ื“ื™ James Azar. ื›ืœ ืชื•ื›ืŸ ื”ืคื•ื“ืงืืกื˜ื™ื ื›ื•ืœืœ ืคืจืงื™ื, ื’ืจืคื™ืงื” ื•ืชื™ืื•ืจื™ ืคื•ื“ืงืืกื˜ื™ื ืžื•ืขืœื™ื ื•ืžืกื•ืคืงื™ื ื™ืฉื™ืจื•ืช ืขืœ ื™ื“ื™ James Azar ืื• ืฉื•ืชืฃ ืคืœื˜ืคื•ืจืžืช ื”ืคื•ื“ืงืืกื˜ ืฉืœื”ื. ืื ืืชื” ืžืืžื™ืŸ ืฉืžื™ืฉื”ื• ืžืฉืชืžืฉ ื‘ื™ืฆื™ืจื” ืฉืœืš ื”ืžื•ื’ื ืช ื‘ื–ื›ื•ื™ื•ืช ื™ื•ืฆืจื™ื ืœืœื ืจืฉื•ืชืš, ืืชื” ื™ื›ื•ืœ ืœืขืงื•ื‘ ืื—ืจ ื”ืชื”ืœื™ืš ื”ืžืชื•ืืจ ื›ืืŸ https://he.player.fm/legal.

๐Ÿšจ Jenkins Bug Exploit Still Active, Github Authentication Flaw, Post Quantum Crypto Deep Dive

๐ŸŽ™๏ธ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners

Todayโ€™s episode will discuss the latest news as Jenkins struggles to patch an active exploit with more news below:

  • Github authentication flaw
  • Microsoft Co-Pilot Leaks Information
  • A Post Quantum Cryptography Deep Dive with Kloch Founder

For more information, please visit our website: https://www.cyberhubpodcast.com/

๐Ÿ‘€ SHOW Supporters:

Todayโ€™s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

โœ… Story Links:

https://www.darkreading.com/vulnerabilities-threats/critical-actively-exploited-jenkins-rce-bug-patch-lag

https://www.securityweek.com/critical-authentication-flaw-haunts-github-enterprise-server/

https://www.securityweek.com/why-linkedin-developed-its-own-ai-powered-security-platform/

https://www.bleepingcomputer.com/news/security/google-fixes-tenth-actively-exploited-chrome-zero-day-in-2024/

https://www.fierceelectronics.com/electronics/post-quantum-cryptography-standards-published-whats-next

https://www.securityweek.com/microsoft-copilot-studio-vulnerability-led-to-information-disclosure/

https://www.securityweek.com/new-phishing-technique-bypasses-security-on-ios-and-android-to-steal-bank-credentials/

https://www.bleepingcomputer.com/news/legal/man-sentenced-for-hacking-state-registry-to-fake-his-own-death/

https://therecord.media/moscow-detains-scientist-ddos-ukraine

๐Ÿ”” Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1

โœ… Important Links to Follow:

๐Ÿ‘‰Substack: http://jamesazar.substack.com

๐Ÿ‘‰Listen here: https://linktr.ee/cyberhubpodcast

โœ… Stay Connected With Us.

๐Ÿ‘‰Facebook: https://www.facebook.com/CyberHubpodcast/

๐Ÿ‘‰LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/

๐Ÿ‘‰Twitter (X): https://twitter.com/cyberhubpodcast

๐Ÿ‘‰Instagram: https://www.instagram.com/cyberhubpodcast

โœ… For Business Inquiries: info@cyberhubpodcast.com

=============================

โœ… Other Videos You Might Be Interested in Watching:

๐Ÿ‘‰ The Unstoppable Rise of AI and the Never Ending Hype

https://youtube.com/shorts/DNPrsK8GNgM?feature=share

๐Ÿ‘‰ A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS

https://www.youtube.com/watch?v=Xth4WIk1kYc

๐Ÿ‘‰ The Latest on the MGM Resorts Ransomware Attack & its impact on Vegas and Cybersecurity overall

https://www.youtube.com/watch?v=T7IyvVSj8FY

๐Ÿ‘‰ What Does Omer Adam & Tel Aviv have to do with Cybersecurity? Find out on CISO Talk

https://www.youtube.com/watch?v=xBJDDN8djU0

๐Ÿ‘‰ Unveiling the Biggest Misconception in SaaS Security

https://youtube.com/shorts/lv-v9FeNamU

=============================

โœ… About The CyberHub Podcast.

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content thatโ€™s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

For Collaboration and Business inquiries, please use the contact information below:


๐Ÿ“ฉ Email: info@cyberhubpodcast.com


๐Ÿ”” Make sure to subscribe and follow us on your favorite podcast-listening platform.

https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1


=================================


#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews


Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.


Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.


ยฉ The CyberHub Podcast

  continue reading

300 ืคืจืงื™ื

ื›ืœ ื”ืคืจืงื™ื

×
 
Loading …

ื‘ืจื•ื›ื™ื ื”ื‘ืื™ื ืืœ Player FM!

Player FM ืกื•ืจืง ืืช ื”ืื™ื ื˜ืจื ื˜ ืขื‘ื•ืจ ืคื•ื“ืงืืกื˜ื™ื ื‘ืื™ื›ื•ืช ื’ื‘ื•ื”ื” ื‘ืฉื‘ื™ืœื›ื ื›ื“ื™ ืฉืชื”ื ื• ืžื”ื ื›ืจื’ืข. ื–ื” ื™ื™ืฉื•ื ื”ืคื•ื“ืงืืกื˜ ื”ื˜ื•ื‘ ื‘ื™ื•ืชืจ ื•ื”ื•ื ืขื•ื‘ื“ ืขืœ ืื ื“ืจื•ืื™ื“, iPhone ื•ืื™ื ื˜ืจื ื˜. ื”ื™ืจืฉืžื• ืœืกื ื›ืจื•ืŸ ืžื ื•ื™ื™ื ื‘ืžื›ืฉื™ืจื™ื ืฉื•ื ื™ื.

 

ืžื“ืจื™ืš ืขื–ืจ ืžื”ื™ืจ

ืคื•ื“ืงืืกื˜ื™ื ืžื•ื‘ื™ืœื™ื