Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...
All content for CyberSpace Podcast is the property of Empirical Training and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...
Bybit Heist, AI Leaks Secrets & US Stop Cyber Offensive | CyberSpace | S2E01
CyberSpace Podcast
33 minutes
8 months ago
Bybit Heist, AI Leaks Secrets & US Stop Cyber Offensive | CyberSpace | S2E01
Welcome back! For season 2 of the Cyber Space podcast. Four cyber security experts unpick some key developments in the threat landscape, including unpicking the Bybit hack where 1.5 trillion dollars of Ethereum was stole, how AI models leaked 12000 passwords and secrets as well as taking a look at recent shifts in the US cyber intelligence programs against Russia. Support the show
CyberSpace Podcast
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...