The Cyber Remediation Reimagined Podcast explores how security leaders are transforming exposure management by putting remediation at the center. Hosted by experts on the frontlines of cyber defense, each episode dives into real-world strategies, automation breakthroughs, compliance, and bold ideas for closing the vulnerability gap faster. If you’re tired of endless alerts and ready to fix what matters, this is your playbook.
In this thought-provoking episode, we explore why Asimov’s famous Three Laws of Robotics fall short in the real world of artificial intelligence. As AI shapes decisions in finance, healthcare, hiring, and content moderation, we dig into the unintended consequences, emotional harm, algorithmic bias, blind obedience, and lack of transparency. What does “harm” really mean in modern AI systems? How can companies build more ethical, exp...
Security platforms promise visibility, but do they actually reduce risk? In this episode, we break down the 10 critical questions every CISO, security director, and IT leader must ask before investing in an Exposure Management Platform (EMP). Learn how to assess platform capabilities across visibility, prioritization, validation, and remediation aligned with the Continuous Threat Exposure Management (CTEM) framework. We’ll explore ...
AT&T Data Breach Exposes 86 Million Customers – What You Need to Know
A bombshell breach has rocked the telecom world. In this episode, we break down the AT&T data leak exposing 86 million customer records — including 44 million unencrypted Social Security numbers and birth dates now circulating on the dark web. From the 2021 ShinyHunters attack to the Snowflake cloud misstep, we trace how fragmented breaches merged into one...
What happens when a mid-tier MSP goes from sleepless nights and manual patching chaos to fully automated, AI-driven vulnerability remediation? In this episode, we tell the story of IT Shield Inc., an MSP that transformed its operations after integrating Vicarius vRx via the Atera App Center. Discover how the Atera-Vicarius partnership enables one-click agent deployment, autonomous patching (with no reboots!), and context-aware prot...
In this episode, we break down the stealthy, high-impact exploit behind CVE-2025-33053, a zero-day vulnerability abused by the APT group Stealth Falcon using nothing more than a weaponized URL. You’ll learn how a simple .url file exploited legacy WebDAV functionality in Windows to drop malware, evade detection, and inject custom spyware into browser processes. We walk through the infection chain, the geopolitical targets, and the c...
Episode 5: From Adversaries to Allies – The Birth of a Purple Team
The battle is over, but the transformation is just beginning. In the season finale of The Purple Team Chronicles, Michelle and Alex sit down for a no-blame debrief—and end up rewriting the rules of cyber defense. What started as a clash ends in collaboration, as Red and Blue join forces to form a true Purple Team. With Vicarius vRx powering continuous attack simulati...
Episode 4: Total Control – The Golden Ticket Coup
In this explosive chapter of The Purple Team Chronicles, Red Team lead Alex escalates from lateral movement to full domain compromise, forging a Golden Ticket that grants him unlimited access across VictimCorp’s network. But Blue Team lead Michelle isn’t fooled. With Vicarius vRx’s telemetry and log forensics, she detects the anomaly, rotates the krbtgt keys, and locks the doors befo...
After a failed persistence attempt, Red Team lead Alex pivots fast dumping LSASS memory and launching a Pass-the-Hash attack to gain Domain Admin access. But Michelle isn’t far behind. With Vicarius vRx detecting the anomaly, she traces the misuse, hardens the registry, and deploys protections before more damage is done. It’s a cat-and-mouse game of tactics and telemetry as both teams escalate.
Real-world parallels, real-time defens...
The breach began, but the game is far from over. In this episode of The Purple Team Chronicles, the Shadow Syndicate’s initial access is cut short yet Alex, the Red Team lead, isn’t backing down. Using native Windows tools, he plants a stealthy, fileless backdoor. But Michelle, the Blue Team lead, isn’t fooled. With Vicarius vRx watching for behavioral anomalies, she spots the subtle registry change and strikes back fast.
Tune in fo...
Every breach starts somewhere and this one began with silence. In the debut of The Purple Team Chronicles, a forgotten VPN endpoint at VictimCorp gives the Shadow Syndicate their entry. Red Team lead Alex exploits the oversight with surgical precision, uncovering a dormant admin account. But Michelle, Blue Team lead and forensic sleuth, isn’t far behind. With Vicarius vRx surfacing anomalous activity in real time, she slams the doo...
Cybercriminals are using AI to develop and launch exploits in hours, so why are defenders still relying on manual patching workflows? In this episode, we explore the seismic shift from human-led vulnerability management to machine-versus-machine remediation. You’ll learn how the cybersecurity talent gap, the explosion of vulnerabilities, and the rise of AI-powered attacks are forcing organizations to rethink their defense strategie...
LockBit has redefined ransomware with modular payloads, rapid encryption, and precision targeting across Windows, Linux, ESXi, and even macOS. In this episode, we dissect the full LockBit kill chain, from initial access through double extortion, and break down a real 2025 case study of a $600K breach. More importantly, we share how security leaders and IT teams can operationalize defense using automation, risk-based patching, and r...
Vulnerability management isn’t just a technical task anymore it’s the foundation of modern compliance. In this episode, we explore how the Vicarius vRx Maturity Model transforms patching from a reactive chore into a proactive, compliance-aligned engine for security progress. Learn how each stage Deploy, Detect, Analyze, Remediate, Automate, maps directly to NIST CSF, ISO 27001, and CIS Controls. We’ll break down how organizations c...
As cybercriminals harness AI to launch faster, smarter, and more evasive attacks, traditional defenses are no longer enough. In this episode, we explore how organizations must shift to machine-versus-machine strategies, deploying AI-powered detection, real-time remediation, and adaptive learning to outpace autonomous threats. From ransomware-as-a-service to AI-generated malware, the threat landscape is evolving at machine speed. Fe...
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
The latest news in 4 minutes updated every hour, every day.
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.
The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com