Home
Categories
EXPLORE
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
PODCAST-097-RICHARD-RODGER-MICROSERVICES
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fc/be/c1/fcbec10e-4fb1-db92-db0d-58c5c94d3009/mza_13266207384991302425.png/600x600bb.jpg
The Cyber Resilience Brief: A SafeBreach Podcast
SafeBreach
27 episodes
6 days ago
Show more...
Technology
News,
Tech News
RSS
All content for The Cyber Resilience Brief: A SafeBreach Podcast is the property of SafeBreach and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fc/be/c1/fcbec10e-4fb1-db92-db0d-58c5c94d3009/mza_13266207384991302425.png/600x600bb.jpg
Ep 16. - Malicious Listeners in Ivanti EPMM: Breaking Down CISA’s AR25-261A Report
The Cyber Resilience Brief: A SafeBreach Podcast
8 minutes
1 month ago
Ep 16. - Malicious Listeners in Ivanti EPMM: Breaking Down CISA’s AR25-261A Report
In this urgent episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach’s Adrian Culley analyze the brand-new CISA AR25-261A report detailing malicious listeners in Ivanti Endpoint Manager Mobile (EPMM). We break down how attackers are exploiting CVE-2025-4427 and CVE-2025-4428, using sophisticated base64-encoded payload delivery to evade detection and establish persistent backdoors. Listeners will learn: How state-sponsored threat groups are targeting multiple industries—including finance, healthcare, retail, education, manufacturing, and energy. The malware techniques involved, from malicious loaders to reassembled encoded chunks. The critical role of Indicators of Compromise (IOCs), YARA rules, and Sigma rules in proactive defense. Why upgrading Ivanti EPMM, treating MDM as critical infrastructure, and deploying phishing-resistant MFA are the top recommendations from CISA. Finally, we share how SafeBreach Labs has already built the attack simulation—available within three hours of CISA’s release—so partners and customers can test, detect, and remediate this threat immediately. 🔒 Stay ahead of attackers. Learn how to protect your organization against one of today’s most pressing Ivanti EPMM threats.
The Cyber Resilience Brief: A SafeBreach Podcast