Stitcher for Podcasts

Get the App Open App
Bummer! You're not a
Stitcher Premium subscriber yet.
Learn More
Start Free Trial
$4.99/Month after free trial
HELP

Show Info

Episode Info

Episode Info:

In this week's episode, Bill and Gavin discuss Cult of the Dead Cow, top ten vulnerabilities, supply chain attacks and leaky geolocation apps.

Episode 5 story list: 

Microsoft Office Dominates Most Exploited List






For more on the Top Ten Vulns of 2018: https://www.tenable.com/cyber-exposure/vulnerability-intelligence






Beto O'Rourke Was Part of an Infamous '90s Hacker Group

A family tracking app was leaking real-time location data

Two serious WordPress plugin vulnerabilities are being exploited in the wild — Ars Technica 

Hackers took over Asus auto update to deliver malware

Apple patches 51 bugs with iOS 12.2 release

Read more »

Discover more stories like this.

Like Stitcher On Facebook

EMBED

Episode Options

Listen Whenever

Similar Episodes

Related Episodes