![Log4j vulnerability (noun) [Word Notes]](https://cdn.podme.com/podcast-images/2A54D1F3036E3729F094750E9BE8E53C_small.jpg)
Log4j vulnerability (noun) [Word Notes]
Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossa...
13 Mai 20259min

What’s inside the mystery box? Spoiler: It’s a scam!
As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a...
8 Mai 202546min
![OWASP broken access control (noun) [Word Notes]](https://cdn.podme.com/podcast-images/2A54D1F3036E3729F094750E9BE8E53C_small.jpg)
OWASP broken access control (noun) [Word Notes]
Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security contr...
6 Mai 20257min
![The RMM protocol: Remote, risky, and ready to strike. [OMITB]](https://cdn.podme.com/podcast-images/BE705614257C7EED9FF46E8F2F3DA4BA_small.jpg)
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intellige...
6 Mai 202539min

The prince, the pretender, and the PSA.
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. ...
1 Mai 202528min
![OWASP security misconfiguration (noun) [Word Notes]](https://cdn.podme.com/podcast-images/2A54D1F3036E3729F094750E9BE8E53C_small.jpg)
OWASP security misconfiguration (noun) [Word Notes]
Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/...
29 Apr 20257min

When AI lies, hackers rise.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal explo...
24 Apr 202542min
![OWASP insecure design (noun) [Word Notes]](https://cdn.podme.com/podcast-images/2A54D1F3036E3729F094750E9BE8E53C_small.jpg)
OWASP insecure design (noun) [Word Notes]
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https:/...
22 Apr 20258min



















