• About
  • Disclaimer
  • Privacy Policy
  • Contact
Friday, July 18, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

Choo Choo Select to disregard the vulnerability • Graham Cluley

Md Sazzad Hossain by Md Sazzad Hossain
0
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Smashing Security podcast #426: Choo Choo Choose to ignore the vulnerability

In episode 426 of the “Smashing Safety” podcast, Graham reveals how one can hijack a practice’s brakes from 150 miles away utilizing package cheaper than a second-hand PlayStation.

You might also like

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

In the meantime, Carole investigates how Grok went berserk, which didn’t cease the Division of Protection signing a contract with Elon’s AI chatbot. So who’s accountable when your chatbot turns into a bigot?

Plus: E-mail complications, SPF rage, and a glowing evaluate for… Taskmaster SuperMax Plus?

All this and extra is mentioned within the newest version of the “Smashing Safety” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

Warning: This podcast might comprise nuts, grownup themes, and impolite language.

Hosts:

Graham Cluley:

 @grahamcluley.com

 @[email protected]

Carole Theriault:

 @caroletheriault

Episode hyperlinks:

Sponsored by:

  • Adaptive Safety – request a customized demo that includes an actual CEO deepfake simulation immediately from adaptivesecurity.com.
  • Vanta – Develop the scope of your safety program with market-leading compliance automation… whereas saving money and time. Smashing Safety listeners get $1000 off!
  • Trelica by 1Password – Entry Governance for each SaaS app. Uncover, handle, and optimize entry for any of your SaaS apps – whether or not managed or unmanaged.

Assist the present:

You may assist the podcast by telling your folks and colleagues about “Smashing Safety”, and leaving us a evaluate on Apple Podcasts or Podchaser.

Turn into a Patreon supporter for ad-free episodes and our early-release feed!

Comply with us:

Comply with the present on Bluesky, or be a part of us on the Smashing Safety subreddit, or go to our web site for extra episodes.

Thanks:

Theme tune: “Vinyl Reminiscences” by Mikael Manvelyan.
Assorted sound results: AudioBlocks.

Discovered this text attention-grabbing? Comply with Graham Cluley on LinkedIn, Bluesky, or Mastodon to learn extra of the unique content material we put up.




Previous Post

Mannequin predicts long-term results of nuclear waste on underground disposal programs | MIT Information

Next Post

“Flipping the Narrative in ‘Slouching In the direction of Utopia'”: Counter-narratives going past the default economics mannequin of exponential development

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters
Cyber Security

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters

by Md Sazzad Hossain
July 17, 2025
The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

by Md Sazzad Hossain
July 17, 2025
How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits
Cyber Security

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

by Md Sazzad Hossain
July 16, 2025
How India’s DPDP Act Impacts Digital Lending
Cyber Security

How India’s DPDP Act Impacts Digital Lending

by Md Sazzad Hossain
July 16, 2025
MITRE Launches New Framework to Sort out Crypto Dangers
Cyber Security

MITRE Launches New Framework to Sort out Crypto Dangers

by Md Sazzad Hossain
July 15, 2025
Next Post
“Flipping the Narrative in ‘Slouching In the direction of Utopia'”:  Counter-narratives going past the default economics mannequin of exponential development

“Flipping the Narrative in ‘Slouching In the direction of Utopia'”: Counter-narratives going past the default economics mannequin of exponential development

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Meet GenSpark Tremendous Agent: The All-in-One AI Agent that Autonomously Assume, Plan, Act, and Use Instruments to Deal with All Your On a regular basis Duties

Meet GenSpark Tremendous Agent: The All-in-One AI Agent that Autonomously Assume, Plan, Act, and Use Instruments to Deal with All Your On a regular basis Duties

April 5, 2025
Answering Enterprise Questions Utilizing SQL

Answering Enterprise Questions Utilizing SQL

May 29, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

From the Group Up: From Begin-As much as Profitable Enterprise Coaches

From the Group Up: From Begin-As much as Profitable Enterprise Coaches

July 18, 2025
“Flipping the Narrative in ‘Slouching In the direction of Utopia'”:  Counter-narratives going past the default economics mannequin of exponential development

“Flipping the Narrative in ‘Slouching In the direction of Utopia'”: Counter-narratives going past the default economics mannequin of exponential development

July 18, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In