
Sign up to save your podcasts
Or
This collection of cybersecurity news highlights critical vulnerabilities and emerging threats. It details a universal bypass technique called "Policy Puppetry" affecting major AI models and flaws in Planet Technology industrial switches and SAP Netweaver software that could lead to system takeover. The newsletter also covers exploitation tactics like Cross-Site WebSocket Hijacking and the use of AI in analyzing cyber incidents and by North Korean threat actors. Furthermore, it reports on the discovery of a Linux rootkit evading detection and various security-focused tools and attack simulations.
Become a Patron:
https://www.patreon.com/DecodedPodcast
Other ways to contribute:
https://buymeacoffee.com/decodedcybersecurity
On Instagram:
Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
This collection of cybersecurity news highlights critical vulnerabilities and emerging threats. It details a universal bypass technique called "Policy Puppetry" affecting major AI models and flaws in Planet Technology industrial switches and SAP Netweaver software that could lead to system takeover. The newsletter also covers exploitation tactics like Cross-Site WebSocket Hijacking and the use of AI in analyzing cyber incidents and by North Korean threat actors. Furthermore, it reports on the discovery of a Linux rootkit evading detection and various security-focused tools and attack simulations.
Become a Patron:
https://www.patreon.com/DecodedPodcast
Other ways to contribute:
https://buymeacoffee.com/decodedcybersecurity
On Instagram:
Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills