The Cyber Exposure Podcast

Top Ten Vulnerabilities and Deceased Bovines


Listen Later

In this week's episode, Bill and Gavin discuss Cult of the Dead Cow, top ten vulnerabilities, supply chain attacks and leaky geolocation apps.

Episode 5 story list: 

Microsoft Office Dominates Most Exploited List

  • https://www.darkreading.com/vulnerabilities---threats/microsoft-office-dominates-most-exploited-list/d/d-id/1334198






For more on the Top Ten Vulns of 2018: https://www.tenable.com/cyber-exposure/vulnerability-intelligence






Beto O'Rourke Was Part of an Infamous '90s Hacker Group

  • https://www.wired.com/story/beto-orourke-cult-of-the-dead-cow-hacking-group/

A family tracking app was leaking real-time location data

  • https://techcrunch.com/2019/03/23/family-tracking-location-leak/?guccounter=1 

Two serious WordPress plugin vulnerabilities are being exploited in the wild — Ars Technica 

  • https://apple.news/AWdmyqmhrSxWRIeKFWWp5ow

Hackers took over Asus auto update to deliver malware

  • https://www.cnet.com/news/hackers-took-over-asus-updates-to-send-malware-researchers-found/

Apple patches 51 bugs with iOS 12.2 release

  • https://www.bleepingcomputer.com/news/security/ios-122-patches-over-50-security-vulnerabilities/
...more
View all episodesView all episodes
Download on the App Store

The Cyber Exposure PodcastBy Tenable