Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/85/36/d0/8536d046-b7fd-9fa2-0cc1-7c085a6cdccf/mza_776189720988249561.jpg/600x600bb.jpg
Daily Cyber Briefing
Mike Housch
50 episodes
2 days ago
Today. I dive into how decades-old tech, like the "Finger" protocol, is being weaponized in modern ClickFix attacks, alongside major zero-day exploitation news affecting FortiWeb and Logitech. We also unpack the sophisticated techniques used by threat actors like Dragon Breath to disable security tools and the concerning new ways researchers are bypassing AI guardrails.
Show more...
Tech News
News
RSS
All content for Daily Cyber Briefing is the property of Mike Housch and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Today. I dive into how decades-old tech, like the "Finger" protocol, is being weaponized in modern ClickFix attacks, alongside major zero-day exploitation news affecting FortiWeb and Logitech. We also unpack the sophisticated techniques used by threat actors like Dragon Breath to disable security tools and the concerning new ways researchers are bypassing AI guardrails.
Show more...
Tech News
News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/85/36/d0/8536d046-b7fd-9fa2-0cc1-7c085a6cdccf/mza_776189720988249561.jpg/600x600bb.jpg
AI Hackers, Worms, and Why CISOs Can’t Get Federal Agencies to Patch
Daily Cyber Briefing
11 minutes
6 days ago
AI Hackers, Worms, and Why CISOs Can’t Get Federal Agencies to Patch
We dive into a massive NPM registry attack where a self-replicating worm polluted the software supply chain with over 150,000 packages seeking cryptocurrency rewards. Then, we analyze how state-sponsored threat actors used Anthropic’s Claude AI to automate 90% of a targeted espionage campaign against critical global organizations.
Daily Cyber Briefing
Today. I dive into how decades-old tech, like the "Finger" protocol, is being weaponized in modern ClickFix attacks, alongside major zero-day exploitation news affecting FortiWeb and Logitech. We also unpack the sophisticated techniques used by threat actors like Dragon Breath to disable security tools and the concerning new ways researchers are bypassing AI guardrails.