Download your favorite episodes and enjoy them, wherever you are! Sign up or log in now to access offline listening.
How Bad User Interfaces Make Security Tools Harmful https://isc.sans.edu/diary/How%20Bad%20User%20Interfaces%20Make%20Security%20Tools%20Harmful/30586 Sys:All Loophole Alloed Us to Penetrate GKE Clusters in Production https://orca.security/resources/blog/sys-all-google-kubernetes-engine-risk-example/ Automotive Pwn2Own https://www.zerodayinitiative.com/blog/2024/1/23/pwn2own-automotive-2024-the-full-schedule Android Keystroke Injection Vulnerability Exploit https://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/ CVE-2024-0769...
show moreAuthor | Johannes Ullrich |
Website | - |
Tags |
Copyright 2024 - Spreaker Inc. an iHeartMedia Company
Browse Spreaker Catalogue to discover great new content
Browse Spreaker Catalogue to discover great new content
It's so quiet here...
Time to discover new episodes!