
Microsoft MFA bypass, cybercrime marketplace takedown, Sophos hacker charged
Cybersecurity Headlines
00:00
Exploiting Vulnerabilities and Information Leaks in Cybersecurity
This chapter examines critical cybersecurity incidents, including a SQL zero-day vulnerability exploited by hackers to infiltrate XG devices. It also addresses potential risks associated with Prometheus Monitoring Toolkit and discusses allegations against a data broker for improper handling of consumer information.
Play episode from 02:25
Transcript


