![]() |
CyberHub PodcastCybersecurity News for Practitioners by Practitioners Hosted by James Azar Author: James Azar
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content thats more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Language: en Genres: News, Tech News, Technology Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
Harvard UPenn Data Leaked ShinyHunters, CISA SolarWinds RCE Exploit, VMware ESXi ZeroDay Ransomware
Episode 1056
Thursday, 5 February, 2026
🎙️ Harvard UPenn Data Leaked ShinyHunters, CISA SolarWinds RCE Exploit, VMware ESXi ZeroDay Ransomware🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1056: Today's episode will discuss the latest news:CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks Critical N8N Flaws Disclosed Along with Public Exploits Hackers Compromise Nginx Servers to Redirect User Traffic✅ Story Links:https://thecyberexpress.com/lakelands-public-health-cyberattack/https://www.bankinfosecurity.com/harvard-upenn-data-leaked-in-shinyhunters-shakedown-a-30677https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/https://cybersecuritynews.com/vmware-esxi-0-day-ransomware-attack/https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/https://www.securityweek.com/vulnerabilities-allowed-full-compromise-of-google-looker-instances/https://www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.htmlhttps://www.securityweek.com/varonis-acquisition-of-alltrue-ai-valued-at-150-million/🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1 🚨 Important Links to Follow: 👉Website:









