Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...
All content for CyberSpace Podcast is the property of Empirical Training and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...
All four of the Empirical Trainers sit down to discuss the latest threats they've been facing in their SOCs. Securing S3 buckets has been an issue since they existed, and new developments have seen an increase in success for S3 bucket sniping and namesquatting, stealing data or uploading malicious files. A new zombie botnet is on the lose, thousands of TPlink devices being compromised by a new remote code execution attack. Support the show
CyberSpace Podcast
Josh and Robbie run duos on the pod this week, looking into early information around the recent Citrix vulnerability (CVE-2025-5777) dubbed Bleed 2 for it's similarity to the 2023 vulnerability. Bleed 2 has opened old wounds, and there has been some confusion amongst researchers and defenders due to a few rouge PoC exploits in the wild... I'm sure we'll come back to this exploit as related compromises are disclosed in the following weeks. For the second part, Robbie and Josh look at a simpler...