
Sign up to save your podcasts
Or


This collection of cybersecurity news highlights critical vulnerabilities and emerging threats. It details a universal bypass technique called "Policy Puppetry" affecting major AI models and flaws in Planet Technology industrial switches and SAP Netweaver software that could lead to system takeover. The newsletter also covers exploitation tactics like Cross-Site WebSocket Hijacking and the use of AI in analyzing cyber incidents and by North Korean threat actors. Furthermore, it reports on the discovery of a Linux rootkit evading detection and various security-focused tools and attack simulations.
Become a Patron:
https://www.patreon.com/DecodedPodcast
Other ways to contribute:
https://buymeacoffee.com/decodedcybersecurity
On Instagram:
Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
By Edward Henriquez4.8
44 ratings
This collection of cybersecurity news highlights critical vulnerabilities and emerging threats. It details a universal bypass technique called "Policy Puppetry" affecting major AI models and flaws in Planet Technology industrial switches and SAP Netweaver software that could lead to system takeover. The newsletter also covers exploitation tactics like Cross-Site WebSocket Hijacking and the use of AI in analyzing cyber incidents and by North Korean threat actors. Furthermore, it reports on the discovery of a Linux rootkit evading detection and various security-focused tools and attack simulations.
Become a Patron:
https://www.patreon.com/DecodedPodcast
Other ways to contribute:
https://buymeacoffee.com/decodedcybersecurity
On Instagram:
Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

56,420 Listeners

8,001 Listeners

175 Listeners

134 Listeners

25 Listeners