Listen "Crowdstrike: The Aftermath - PSW #836"
Episode Synopsis
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow attacks, IPC and DBUS and a very informative and entertaining article, container breakouts, when you are bored on an airplane, Linksys security violations, fake IT workers, Telegram 0-day, and how to be more resilient on the same technology stack! Show Notes: https://securityweekly.com/psw-836
More episodes of the podcast Paul's Security Weekly (Video)
Going Around EDR - PSW #900
13/11/2025
Cybersecurity Is Dead - PSW #898
30/10/2025
Its Always DNS - PSW #897
23/10/2025
AI, EDR, and Hacking Things - PSW #896
16/10/2025
IoT Hacks Galore - Kieran Human - PSW #895
09/10/2025
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
25/09/2025
Safes, Hackers, and Web Servers - PSW #892
18/09/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.