InfoSec.Watch

Infosec.Watch

The InfoSec.Watch Podcast delivers the week’s most important cybersecurity news in a fast, clear, and actionable format. Each episode breaks down major incidents, vulnerabilities, threat-actor activity, and security trends affecting modern organizations — without the noise or hype. The show translates complex cyber topics into practical insights you can use immediately in your job, whether you work in security engineering, cloud security, threat detection, governance, or IT. If you want to stay ahead of emerging threats, sharpen your defensive mindset, and get a reliable summary of what actually matters each week, this is your new essential briefing. Actionable Cybersecurity Insights — Every Week.

  1. HÁ 2 DIAS

    InfoSec.Watch Podcast — Episode 124: Edge Devices Under Fire

    Send a text Edges are where attackers thrive—and where many teams see the least. We dive into how identity-adjacent features, single sign-on, and device management planes have become high-impact targets, and why routers, VPNs, and firewalls now sit at the center of modern intrusion campaigns. From unsupported hardware to multi-terabit DDoS events, we break down what matters most and the steps that actually change your risk. We walk through CISA’s directive to remove end-of-life edge devices and translate it into a practical playbook: inventory every public IP, map models and firmware to vendor support, and set non-negotiable retirement deadlines. Then we stress-test DDoS readiness at today’s scale, with concrete checks for always-on scrubbing, runbooks, and confirmed capacity with your CDN, WAF, and upstream providers. On the software side, we examine fresh NPM and PyPI compromises and outline a developer-first defense: dependency pinning, integrity checks, SBOM usage, mirrored registries, and CI/CD policies that block unknown maintainers by default. Urgency ramps up with active exploits added to CISA’s Known Exploited Vulnerabilities list. We prioritize SmarterMail, SolarWinds Web Help Desk, and GitLab SSRF with rapid patching, strict segmentation, emergency hardening, token rotation, and egress controls. We also spotlight a trend to watch: adversary-in-the-middle frameworks targeting routers and edge devices to hijack traffic. The counter is clear—treat the edge as a tier-one detection surface with telemetry for config drift, new admins, DNS and NTP anomalies, and require phishing-resistant MFA like FIDO2 or passkeys for all admin access. To help teams move faster, we highlight the KEV catalog’s machine-readable feed and show how to wire it into vulnerability management to auto-open tickets and enforce tight SLAs based on real-world exploitation. We close with an actionable one-week project: enumerate public edges, flag end-of-support gear, and either replace it, shield it behind managed services, or lock its management plane behind VPN with strict allow lists. Subscribe, share with your team, and leave a review with the one control you’ll implement first—what’s your next move to harden the edge? Support the show Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    9min
  2. 5 DE FEV.

    InfoSec.Watch Podcast — Episode 123: Fortinet SSO abuse, Ivanti MDM zero-days, and validating trust after patching

    Send us a text This week on the InfoSec.Watch Podcast, we break down a series of actively exploited vulnerabilities targeting some of the most trusted control planes in enterprise environments—firewalls, identity integrations, and mobile device management platforms. The episode opens with active exploitation of Fortinet’s FortiCloud SSO authentication bypass (CVE-2026-24858), impacting FortiManager, FortiAnalyzer, and FortiPortal deployments with SSO enabled. With CISA publishing mitigation guidance, the hosts explain why FortiCloud SSO must be treated as an exposure multiplier, and why defenders should assume compromise, hunt for persistence, and validate trust even after patching. Next, the focus shifts to Ivanti Endpoint Manager Mobile (EPMM), where a pre-auth remote code execution (CVE-2026-1281)—alongside a second critical path traversal flaw—is being exploited in the wild. Grant and Sloane outline why MDM platforms are Tier-Zero assets, capable of controlling entire mobile fleets, and walk through the post-patch actions required to detect chaining, persistence, and credential theft. The episode also examines a ransomware incident impacting New Britain, Connecticut, highlighting the real-world consequences for local governments when core services go offline. The discussion emphasizes segmentation between public safety and business systems, offline operating procedures, and the importance of tested restores for directory services, VoIP, and line-of-business applications. In the Vulnerability Spotlight, the hosts take a deeper look at how attackers abuse alternate authentication paths, particularly SSO flows and SAML integrations, to bypass perimeter defenses. This leads into the Trend to Watch: identity convenience is becoming the new perimeter, and SSO features increasingly represent cascading failure points across cloud and on-prem infrastructure. The Policy & Regulation Watch covers new FCC guidance on ransomware preparedness, reinforcing the need for offline recovery validation and tabletop exercises focused on restoring critical services under active attack. Tool of the Week highlights CISA’s alert feed and KEV updates, with practical advice on wiring alerts directly into vulnerability triage workflows and enforcing same-day response SLAs for confirmed exploitation. The episode closes with a highly actionable Defense Move of the Week: implementing a repeatable validation loop for Tier-Zero systems—verify versions, confirm exposure removal, review logs, and rotate secrets—to ensure remediation actually worked. Key themes this week: SSO as an alternate intrusion pathMDM and firewalls as Tier-Zero assetsActive exploitation requires validation, not trustPatch fast—but always hunt and verifyFor the full weekly brief and ongoing coverage, subscribe at infosec.watch and follow InfoSec.Watch on X, Facebook, and LinkedIn. Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    17min
  3. 26 DE JAN.

    InfoSec.Watch Podcast — Episode 122: Cisco UC zero-days, Oracle patch overload, and the new Tier-Zero reality

    Send us a text This week on the InfoSec.Watch Podcast, we break down a wave of high-impact security events underscoring a hard truth for defenders: management planes and dependencies are now primary intrusion paths. The episode opens with active exploitation of a Cisco Unified Communications zero-day (CVE-2026-20045), an unauthenticated web-management RCE capable of delivering full root-level compromise across multiple UC platforms. With exploitation confirmed and CISA adding the flaw to its Known Exploited Vulnerabilities list, the hosts explain why UC management interfaces must be treated as Tier-Zero assets, and why assumed-breach reviews are mandatory even after patching. Next, the discussion turns to Oracle’s January Critical Patch Update, delivering more than 300 fixes across its portfolio. Grant and Sloane walk through a practical prioritization strategy—patching by exposure, not product name—and explain how to use Oracle’s own exploitability flags and compensating controls to avoid patch paralysis. The episode also covers Ingram Micro’s ransomware-related data exposure, highlighting the growing risk of third-party concentration. The hosts outline what every organization should have ready before a supplier breach occurs, from notification SLAs and data minimization to pre-staged third-party incident response playbooks. In the Vulnerability Spotlight, the focus shifts to two expanding attack surfaces: Unauthenticated management UI exploitation as a recurring root-compromise patternMalicious code embedded in developer dependencies, including a widely used package now listed in CISA’s KEV catalogThe Trend to Watch ties these threads together: attackers are moving up the stack, blending classic perimeter weaknesses with modern software supply-chain abuse. Management planes, CI/CD pipelines, and automation platforms are increasingly being scanned, scripted, and poisoned at scale. The episode closes with a decisive Actionable Defense Move of the Week—formally defining your Tier-Zero systems and enforcing strict controls around access, exposure, monitoring, and containment—followed by a clear final warning: if a management interface is reachable from the internet, attackers will automate it. For deeper coverage and weekly briefings delivered straight to your inbox, subscribe at infosec.watch and follow InfoSec.Watch on X, Facebook, and LinkedIn. Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    10min
  4. 19 DE JAN.

    InfoSec.Watch Podcast — Episode 121: Cisco email gateway RCEs, Windows zero-days, and control-plane failure

    Send us a text This week on the InfoSec.Watch Podcast, we break down a series of high-impact threats targeting the systems organizations rely on most—email gateways, Windows endpoints, and operational infrastructure that does not fail gracefully. The episode opens with an urgent look at Cisco AsyncOS (CVE-2025-20393), an actively exploited, unauthenticated remote-code-execution flaw affecting Cisco Secure Email Gateway and Secure Email and Web Manager deployments. The hosts explain why email gateways must be treated as Tier-Zero assets, outline post-patch hunting requirements, and discuss the real-world risk of persistence on perimeter infrastructure. Next, the conversation turns to Microsoft’s January Patch Tuesday, including CVE-2026-20805, an actively exploited Windows zero-day now listed in CISA’s Known Exploited Vulnerabilities catalog. While the vulnerability appears low-severity on paper, Grant and Sloane explain how information-disclosure bugs are routinely chained into full compromise—especially on jump hosts, VDI, and privileged systems. The episode also examines a ransomware attack on the AZ Monica hospital network in Belgium, highlighting the operational and patient-safety consequences when healthcare infrastructure goes offline. The discussion focuses on availability planning, segmentation, paper-mode readiness, and the importance of rehearsed downtime procedures. In the Vulnerability Spotlight, the hosts cover active exploitation of a high-severity flaw in Gogs, a self-hosted Git service, and an unauthenticated denial-of-service condition impacting Palo Alto Networks GlobalProtect. Both cases reinforce a central theme: development and remote-access infrastructure must be treated as production-critical systems. The Trend to Watch explores a growing supply-chain risk in workflow automation platforms like n8n, where compromised community plugins can expose stored credentials and API tokens—effectively turning automation tools into high-value credential vaults. The episode closes with a practical Actionable Defense Move of the Week, urging teams to focus on one high-impact service class and validate patching, exposure, logging, and rapid containment capabilities—before the next advisory drops. Key themes this week: Email gateways as Tier-Zero infrastructureActive exploitation outweighs CVSS scoresAvailability is a primary security concernControl planes and automation platforms are high-leverage targetsFor full coverage, subscribe to the newsletter at infosec.watch and follow InfoSec.Watch on X, Facebook, and LinkedIn. Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    9min
  5. 13 DE JAN.

    InfoSec.Watch Podcast — Episode 120: Control planes are attack planes

    Send us a text Welcome back to the InfoSec.Watch Podcast, your weekly briefing on the security threats that matter. In Episode 120, we break down a clear and recurring theme across this week’s incidents: control planes have become prime attack planes. We start with active exploitation of a critical flaw in HPE OneView, underscoring why management-plane software must be treated as Tier Zero infrastructure. From there, we examine unpatchable risk posed by actively exploited, end-of-life D-Link DSL gateways, and a critical unauthenticated RCE (CVSS 9.8) in Trend Micro Apex Central, where compromise could allow attackers to disable security controls at scale. In the Vulnerability Spotlight, we cover: A jsPDF path traversal flaw highlighting real-world software supply chain riskMultiple Veeam Backup & Replication fixes, reinforcing why backup platforms remain high-value ransomware targetsOur Trend to Watch looks at a growing enterprise data-loss vector: prompt-poaching via malicious browser extensions, where entire GenAI conversations — including sensitive code and data — are being exfiltrated from tools like ChatGPT. We also discuss: CISA’s move to formally retire early Emergency Directives in favor of a mature KEV-driven vulnerability processWhy organizations should adopt their own “KEV-style” prioritization modelChainsaw, a high-performance open-source tool for rapid Windows EVTX triageIn this week’s Actionable Defense Move, we walk through a 30-minute management-plane exposure sweep — a fast, high-impact exercise to identify publicly exposed admin interfaces before attackers do. Final takeaway: attackers will always gravitate toward systems where privileges are concentrated. If a control plane must exist, it must be tightly restricted, aggressively patched, and continuously monitored. For a full written breakdown of these stories and more, subscribe to the InfoSec.Watch newsletter at infosec.watch, and follow us on X, Facebook, and LinkedIn for updates throughout the week. Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    10min
  6. 5 DE JAN.

    InfoSec.Watch Podcast — Episode 119: WatchGuard VPN RCE, MongoDB MongoBleed, and WebRAT GitHub traps

    Send us a text In this week’s episode of the InfoSec.Watch Podcast, hosts Grant Lawson and Sloane Parker break down the security stories that defenders can’t afford to ignore. The episode opens with urgent patching guidance for an actively exploited WatchGuard IKEv2 VPN remote code execution flaw, followed by analysis of “MongoBleed” (CVE-2025-14847)—a memory disclosure vulnerability in MongoDB now seeing real-world exploitation. Grant and Sloane walk through not just why these issues matter, but what defenders should be doing after patching, including log review, threat hunting, and hardening exposed services. The discussion then turns to a growing threat targeting security teams themselves: malicious GitHub proof-of-concept repositories that masquerade as exploit code but actually deploy WebRAT malware. The hosts explain how researchers and blue teams can safely handle PoCs without becoming the next breach. Other highlights include: A breakdown of the Aflac breach notification affecting 22.65 million individuals and why incident response doesn’t end at containmentOngoing DDoS disruptions impacting French postal and banking services, with a focus on operational resilience and customer communicationA Vulnerability Spotlight on a critical SmarterMail flaw enabling arbitrary file upload and likely RCETool of the Week: Praetorian’s Gato, which maps attack paths in CI/CD environments using GitHub Actions and self-hosted runnersA Deep Dive into the accelerating weaponization of AI-driven phishing campaignsThe episode wraps with an Actionable Defense Move of the Week, outlining a formal, repeatable process for safely handling exploit code, and a Final Word on why fundamentals—patching, exposure management, and disciplined workflows—still define the fastest path to compromise. For full analysis, links, and takeaways, subscribe to the newsletter at infosec.watch and follow along on X, LinkedIn, and Facebook. Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    11min
  7. 30/12/2025

    InfoSec.Watch Podcast — Episode 118: Perimeter zero-days, email gateway attacks, and weaponized GitHub PoCs

    Send us a text In this week’s InfoSec.Watch Podcast, we break down a series of critical security developments shaping the threat landscape. The episode opens with urgent guidance on two actively exploited, unauthenticated remote-code-execution vulnerabilities—one affecting WatchGuard Firebox appliances and the other impacting HPE OneView across multiple versions. The hosts outline the immediate actions every defender must take, from emergency patching to post-patch hunting and access-control validation. The Vulnerability Spotlight shifts to escalating attacks on email security gateways, a high-leverage target where compromise grants adversaries deep visibility and control across an organization’s communications. Grant and Sloane detail how attackers are abusing these systems for redirection, injection, and lateral movement—and why defenders must adopt a more aggressive hunt posture on these assets. In Trend to Watch, they examine a troubling new campaign uncovered by Kaspersky: a WebRAT distributed through GitHub repositories masquerading as Proof-of-Concept exploits. The campaign specifically targets students and early-career researchers, weaponizing curiosity to compromise analyst workstations. The hosts share essential operational security guidance for safely handling PoCs and research tooling. This week’s Quick Hits include new FBI IC3 warnings about rapport-building scams that shift victims to encrypted messaging apps—along with a reminder to expand phishing simulations to include voice and messaging impersonation scenarios. The Actionable Defense Move of the Week highlights a powerful preparedness tactic: creating a one-hour response checklist for critical edge devices and administrative interfaces. Grant and Sloane walk through what belongs on that list—from isolation steps and forensic captures to credential rotations and enhanced monitoring—emphasizing that speed, not perfection, wins the first hour of a zero-day event. They close with a Final Word on attacker strategy: adversaries are increasingly targeting high-leverage choke points such as email gateways, identity pathways, and management services. Real resilience now depends on reducing time-to-mitigate and protecting systems that function as force multipliers for attackers. Stay ahead of the threats that matter with this week’s briefing, and subscribe at infosec.watch for full coverage and daily updates. Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    8min
  8. 22/12/2025

    InfoSec.Watch Podcast — Episode 117: Choke Points Under Fire: Email Gateways, WebKit Zero-Days, and DPRK's $2B Crypto Heist

    Send us a text In this week's InfoSec.Watch Podcast, we dive into the latest high-impact threats targeting enterprise security choke points. Key stories include: A sophisticated campaign against Cisco Secure Email appliances, with essential guidance on hardening management interfaces and proactive threat hunting.Chainalysis' alarming report on North Korea-linked actors stealing a record $2.02 billion in cryptocurrency in 2025 through fewer, more targeted attacks.Ongoing disruption of municipal services, underscoring the urgent need for OT/IT segmentation and manual failover planning.The Vulnerability Spotlight focuses on two actively exploited Apple WebKit zero-days (now added to CISA's KEV catalog), emphasizing rapid patching via MDM and broader attack surface awareness. Also covered: FBI warnings on AI-generated voice deepfakes in impersonation scams, a new security tool called Proximity for scanning AI agent MCP servers, and practical defenses against evolving social engineering. The Actionable Defense Move of the Week: Build a pre-prepared one-hour containment checklist for critical edge and admin systems to enable fast, decisive incident response. Wrap-up theme: Attackers are zeroing in on high-leverage assets—make "time-to-mitigate" a core KPI for resilience in 2026 and beyond. Subscribe at infosec.watch for deeper analysis and daily updates. Stay secure! Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!

    10min

Sobre

The InfoSec.Watch Podcast delivers the week’s most important cybersecurity news in a fast, clear, and actionable format. Each episode breaks down major incidents, vulnerabilities, threat-actor activity, and security trends affecting modern organizations — without the noise or hype. The show translates complex cyber topics into practical insights you can use immediately in your job, whether you work in security engineering, cloud security, threat detection, governance, or IT. If you want to stay ahead of emerging threats, sharpen your defensive mindset, and get a reliable summary of what actually matters each week, this is your new essential briefing. Actionable Cybersecurity Insights — Every Week.