התחל במצב לא מקוון עם האפליקציה Player FM !
199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023
Manage episode 452531143 series 2872461
Enjoying the content? Let us know your feedback!
This week, we’re diving into a hot-off-the-presses report from the FBI, CISA, and NSA —a breakdown of the most exploited vulnerabilities of 2023. Think of this as the hackers' “most wanted” list: the weaknesses in software and systems that bad actors love to exploit because they’re effective and widely available.
Before we get into that, lets review the top security news this week.
- Pygmy Goat: The Sophisticated Linux Backdoor Targeting Network Devices
- https://www.ncsc.gov.uk: Pygmy Goat Analysis
- https://www.cisa.gov: 2023 Top Routinely Exploited Vulnerabilities
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
223 פרקים
Manage episode 452531143 series 2872461
Enjoying the content? Let us know your feedback!
This week, we’re diving into a hot-off-the-presses report from the FBI, CISA, and NSA —a breakdown of the most exploited vulnerabilities of 2023. Think of this as the hackers' “most wanted” list: the weaknesses in software and systems that bad actors love to exploit because they’re effective and widely available.
Before we get into that, lets review the top security news this week.
- Pygmy Goat: The Sophisticated Linux Backdoor Targeting Network Devices
- https://www.ncsc.gov.uk: Pygmy Goat Analysis
- https://www.cisa.gov: 2023 Top Routinely Exploited Vulnerabilities
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
223 פרקים
כל הפרקים
×


1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41


1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58

1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53

1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05

1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22

1 210 - Adversarial Misuse of Generative AI 50:21

ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.