In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
All content for Defending The Edge is the property of DefendEdge and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
33. Cyber Frontlines, VMware Flaws, and Political Pushbacks
Defending The Edge
21 minutes
7 months ago
33. Cyber Frontlines, VMware Flaws, and Political Pushbacks
On this episode of the Defending The Edge Podcast, join the team in the talks about the recent halt to forward operations against Russia with potential effects on the threat landscape and the continuously closing gap between politics and cybersecurity. Additionally, the team talks through prominent VMware product ESX/ESXi Virtual Machine Escape, 0-Day vulnerabilities, and threat actors claiming to be selling access.
Defending The Edge
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.