Artwork

Contenuto fornito da Automox. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Automox o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Patch [FIXED] Tuesday – The Vulnerabilities That Defined 2024

1:13:19
 
Condividi
 

Manage episode 458322633 series 3528713
Contenuto fornito da Automox. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Automox o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Join us for a special bonus episode of Patch [FIX] Tuesday, an hour-long compilation of the vulnerabilities that help shaped the cybersecurity landscape in 2024.

This episode recaps some the most critical and interesting exploits, from supply chain compromises to elevation of privilege threats targeting widely used platforms. Whether you're an IT administrator, security professional, or tech enthusiast, this episode provides valuable insights to stay ahead of evolving threats.

Here’s a list of vulnerabilities discussed in this episode, and be sure to tune into the Patch [FIX] Tuesday podcast on the second Tuesday of every month.

  1. Operation Triangulation (00:13)
  2. CVE-2024-21401: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability (5:00)
  3. CVE-2024-21400: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability (11:00)
  4. CVE-2024-3094: XZ/Liblzma Supply Chain Backdoor (17:08)
  5. CVE-2024-4671: Google Chrome Use-After-Free Vulnerability (30:00)
  6. CVE-2024-30078: Windows WiFi Driver Remote Code Execution Vulnerability(35:03)
  7. CVE-2024-38053: Windows Layer Two Bridge Network RCE (47:14)
  8. CVE-2024-38180: SmartScreen Prompt Remote Code Execution Vulnerability (53:12)
  9. CVE-2024-43491: Microsoft Windows Update Remote Code Execution Vulnerability (1:00:00)
  10. CVE-2024-43533: Remote Desktop Client Remote Code Execution Vulnerability (1:04:24)
  11. CVE-2024-5535: Microsoft Defender for Endpoint Remote Code Execution Vulnerability (1:07:35)
  12. CVE-2024-49093: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability (1:09:36)
  continue reading

125 episodi

Artwork
iconCondividi
 
Manage episode 458322633 series 3528713
Contenuto fornito da Automox. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Automox o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Join us for a special bonus episode of Patch [FIX] Tuesday, an hour-long compilation of the vulnerabilities that help shaped the cybersecurity landscape in 2024.

This episode recaps some the most critical and interesting exploits, from supply chain compromises to elevation of privilege threats targeting widely used platforms. Whether you're an IT administrator, security professional, or tech enthusiast, this episode provides valuable insights to stay ahead of evolving threats.

Here’s a list of vulnerabilities discussed in this episode, and be sure to tune into the Patch [FIX] Tuesday podcast on the second Tuesday of every month.

  1. Operation Triangulation (00:13)
  2. CVE-2024-21401: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability (5:00)
  3. CVE-2024-21400: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability (11:00)
  4. CVE-2024-3094: XZ/Liblzma Supply Chain Backdoor (17:08)
  5. CVE-2024-4671: Google Chrome Use-After-Free Vulnerability (30:00)
  6. CVE-2024-30078: Windows WiFi Driver Remote Code Execution Vulnerability(35:03)
  7. CVE-2024-38053: Windows Layer Two Bridge Network RCE (47:14)
  8. CVE-2024-38180: SmartScreen Prompt Remote Code Execution Vulnerability (53:12)
  9. CVE-2024-43491: Microsoft Windows Update Remote Code Execution Vulnerability (1:00:00)
  10. CVE-2024-43533: Remote Desktop Client Remote Code Execution Vulnerability (1:04:24)
  11. CVE-2024-5535: Microsoft Defender for Endpoint Remote Code Execution Vulnerability (1:07:35)
  12. CVE-2024-49093: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability (1:09:36)
  continue reading

125 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida

Ascolta questo spettacolo mentre esplori
Riproduci