Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/19/51/79/19517980-623d-a101-fa44-1c726ad86c65/mza_12095998176625063391.jpeg/600x600bb.jpg
IT SPARC Cast
John Barger
109 episodes
2 days ago
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
RSS
All content for IT SPARC Cast is the property of John Barger and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Tech News
Technology,
News,
News Commentary
https://assets.pippa.io/shows/66cf6d924960e4eb18d4aa8d/1760104936825-f7d33e2a-edda-4bbf-b736-d42e4b50a524.jpeg
Redis “RediShell” CVE-2025-49844: Cloud Infrastructure at Risk
IT SPARC Cast
10 minutes 23 seconds
3 weeks ago
Redis “RediShell” CVE-2025-49844: Cloud Infrastructure at Risk

In this week’s episode of IT SPARC Cast - CVE of the Week, John Barger and Lou Schmidt dive deep into CVE-2025-49844, a newly discovered and critical remote code execution vulnerability in Redis—the in-memory database that powers over 75% of cloud services. This flaw, dubbed “RediShell”, scores a perfect 10.0 CVSS and affects Redis instances using Lua scripting, allowing attackers to execute arbitrary code and gain full system control.


This 13-year-old bug stems from a use-after-free memory corruption issue that lets attackers escape the Lua sandbox, run malicious code, exfiltrate data, deploy crypto miners, or move laterally inside cloud environments. Even worse—more than 60,000 internet-exposed Redis servers have no authentication, leaving them completely open to exploitation.


John and Lou discuss how this happened, what you can do to secure your infrastructure, and why “cloud-hosted” doesn’t always mean “secure.”

✅ Key Takeaways:

•Update to patched versions immediately (8.2.2, 8.0.4, 7.4.6, 7.2.11, 6.2.20)

•Restrict network access with ACLs

•Rotate all credentials and API keys

•Don’t run Redis as root

•Isolate any compromised hosts before investigation


Lou calls it “a 10 on the oh-crap-ometer”—and he’s not wrong.


https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html

https://www.darkreading.com/cloud-security/patch-now-redishell-redis-rce


Hosted on Acast. See acast.com/privacy for more information.

IT SPARC Cast
IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.