Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/4b/fa/9a/4bfa9a8e-b5c0-72ab-92df-8a90874d8127/mza_5958692215831676045.jpg/600x600bb.jpg
CyberSpace Podcast
Empirical Training
65 episodes
1 month ago
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...
Show more...
Technology
RSS
All content for CyberSpace Podcast is the property of Empirical Training and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/4b/fa/9a/4bfa9a8e-b5c0-72ab-92df-8a90874d8127/mza_5958692215831676045.jpg/600x600bb.jpg
CoPilot EchoLeak Bug | CyberSpace | S2E13
CyberSpace Podcast
37 minutes
4 months ago
CoPilot EchoLeak Bug | CyberSpace | S2E13
Gen AI, LLMs and new applications of AI have created novel attack surfaces for attackers to probe, often looking to exfiltrate the hoards of sensitive data held in vector data stores. Luckily, the researchers got there first this time and discovered a super interesting attack sequence that tricks CoPilot into locating the most sensitive data it has access to, and then exfiltrating it to the attackers server. Josh, AJ and Vaughan take a look at this new bug in some depth, before looking at oth...
CyberSpace Podcast
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...