
When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email – they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with parts of their own archive to smear the blogger’s name.
In this episode, we unravel how a website designed to preserve history may have trashed its own credibility – and how Wikipedia responded when trust went out the window.
Plus a ransomware gang shoots itself in the foot with a classic case of buffoonery, accidentally corrupting the very keys victims would need to decrypt their data. When even the criminals can’t unlock your files, what happens next?
All this, a surprisingly zen Pick of the Week, and a gloriously splenetic rant against web forms, on episode 456 of the award-winning “Smashing Security” podcast, with cybersecurity veteran and keynote speaker Graham Cluley and special guest Paul Ducklin.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Yeah, it's sort of hard to imagine that there is a new category of porn, whether AI or not.
My name's Graham Cluley.
This week on Smashing Security, we won't be talking about a new app which promises to tell you if someone is wearing smart glasses in your vicinity.
You'll hear no discussion of how a medical records data company has been taken offline after some patients' records were hacked to say that they were dead.
And the subtitle, without giving too much away, Graham, is "You had one job." And I'm going to be explaining why Wikipedia has blacklisted archive.today.
Most cyberattacks don't start with some genius hacker writing custom malware.
They start with something much simpler, like a misconfigured setting, an exposed service, or a security policy that quickly drifted out of line.
And in large, complex IT environments, those misconfigurations are everywhere and almost impossible to track manually.
And that's why ThreatLocker built Defense Against Configurations, or DAC. ThreatLocker DAC gives you a real-time view of configuration weaknesses across your entire environment.
It runs deep checks across every endpoint, not just your ThreatLocker policies, but your operating systems and application settings too.
All of it appears in one clean dashboard showing what's misconfigured, how risky it is, and exactly how to fix it. So no more discovering problems after the attackers do.
With DAC, you see configuration drift as it happens. You can also check alignment with major security frameworks and see which endpoints don't make the grade.
If you want to stop firefighting, harden your environment, and catch hidden risks before they turn into breaches, you need DAC.
Try it for free for 30 days at threatlocker.com and find out what's misconfigured before it costs you.
So, as I said at the beginning, I'm going to talk to you today about the website archive.today, also known as archive.is and archive.ph.
Archive.today is an internet website archiving service. Duck, have you ever used archive.today?
And you need to be careful of trying some other top-level domain because it might be an imposter or a lookalike or not quite what you expected.
One is that the Internet Web Archive apparently is not quite as good at archiving some pages as archive.today is.
Apparently archive.today, for instance, is pretty good at archiving articles behind paywalls.
So if you didn't want to pay your £11 a month for the privilege, you could use archive.today for doing that.
Now, of course, lots of people will have problems with that, not least the people who are running the paywall and are trying to earn a buck or two from all the work that they're creating.
But that's why some people use it.
So it's handy if you're a researcher or a journalist, archive.today has been running for over a decade and it's been really successful. In fact, Wikipedia uses archive.today a lot.
I think the only web archiving service it uses more is the one you've already mentioned, archive.org. Over 400,000 Wikipedia pages include links to archive.today.
So it's pointing to archives of web pages that are being referenced in case they ever drop off the internet in the future.
It's not making any money as far as I know from my eyeballs.
So if, for instance, you wanted to read a New York Times article and you've read your allocation for the month, archive.today could be able to blast past that paywall and show you the article, and you don't have to cough up any cash.
So you can understand why some people don't like archive.today.
Also, if archive.today has kept a copy of an old web page which you feel shows you in a bad light, even if that web page was later updated, you aren't necessarily going to like that archive.today has a version where maybe you weren't looking quite so cool.
And although it isn't your site, it jolly well looks like it. I can understand why that would make you quite anxious.
And so they wrote me a legal letter saying, remove our name from your website. And I responded saying, well, it appears you were breached. You know, it's here's your data.
It's out there on the internet. Anyway.
I don't want to waste all the time. So what I decided to do was I went to that article, I redacted their name with actual black blocks in the HTML whenever their name was.
And then I posted up on Twitter as it was back then when I used Twitter.
I said, unfortunately, I've had to remove this article because blank, blank, blank, blank has sent me a letter.
And that of course had so many people racing over to the web archive to find an old version of the article, causing them much more of a headache.
As if I ever knew that was going to happen. As if I ever realised.
So one of the things that archive.today does is it protects itself with a CAPTCHA, right? Yes. To make sure that anyone visiting it is a human rather than a bot.
So you have to tick a box, say, yes, I'm a human. We've all seen those a million times before.
And that obviously can prevent all kinds of shenanigans launched against archive.today, like DDoS attacks. Anyway, that's a bit of an aside.
But despite being so popular and around for, what was it, 10 years or so, some things about it are still a bit of a mystery, like who is running archive.today?
And it turns out nobody knows for sure. There's been some suggestion that it might be someone in Russia, but no one's quite certain.
And I guess, you know, that's partly, maybe it's unclear and not made public because that's one of the ways the site protects itself from people who would rather see it gone.
It's like, well, we're not going to reveal who we are. So what happens when the cops want to know who is really running archive.today?
And Archive.today, what they did was they posted a screenshot of that up on Twitter, and that understandably got journalists sniffing into the story a bit more.
It's like, oh, hang on, this is interesting. The FBI trying to find out who runs it.
They put up this screenshot and the journalists were wondering, well, I wonder who is behind the site.
And what journalists at Ars Technica and The Verge and Heise Online discovered was that a couple of years ago, someone else was curious, an independent Finnish blogger, a software engineer called Yanni Patokalio had also spent time trying to figure out the true identity of whoever was behind archive.today.
And he didn't crack the mystery, but he gathered some breadcrumbs together. He noted down his evidence in a blog post, and he published it a couple of years ago.
And the blog post got a few thousand views, but then, you know, no one was paying attention to it.
But now, Ars Technica and others were interested in this topic, and they were linking to this old article.
So suddenly lots of people are reading this old article about the supposed possible identity and pseudonyms being used by the person behind archive.today.
And, well, what do you know, but whoever runs archive.today noticed.
And they made what can probably only be described as some of the most self-defeating series of decisions in the history of the internet.
Like that experience you described of your own, where if they just kept quiet about it or came out and said, yes, we did get breached, but here's what we've done about it.
And everyone would have gone, what a lovely company. They decided, let's go bashing on the window and shouting at them.
Anyway, so first a complaint was filed against Yanni's blog hosting company alleging that his post about the site was defamatory because it mentioned some possible aliases which the owner of the site had used.
And well, Yanni, he did the natural thing. He went to an AI and got it to draft his rebuttal to his blog host, and the complaint was rejected by his blog host.
So, you know, well done AI. AI succeeded in helping Yanni write his rebuttal.
But then the anonymous archive.today webmaster sent Yanni a fairly polite email asking him to remove the post.
Unfortunately, his email, for some reason, ended up in Yanni's spam folder. So he didn't see it for 5 days.
And in those 5 days, well, the temperature was just turned up a notch because what happened was a DDoS attack started against Yanni's blog.
What had happened was archive.today modified its capture page, the page seen by millions of people every day, to include a piece of JavaScript that every 300 milliseconds would send a request to Yanni's website, basically a search request, a URL with a, you know, question mark, S equals, and then some random characters.
So it couldn't be easily cached. Basic defenses wouldn't have been able to stop it.
He was suddenly getting bombarded. And according to Jāni, he says the stated goal was to increase his bill at his web host. Unfortunately, he was on a flat fee plan.
I think it was a WordPress site, or maybe it's on wordpress.com even. So he was just paying so much and it's like, well, it doesn't affect me.
My web host may be paying, but they're not charging me anything for this. So the DDoS attack cost him exactly zero.
So you've now got this, what appeared to be a legitimate web archiving service, launching a DDoS attack against some poor little Finnish blogger.
He's told that a gay dating app would be created in his name.
But also Wikipedia editors, they noticed that some of the archive pages that Wikipedia was linking to had now been altered to include Jāni's name.
His name was being inserted into snapshots in ways they said were intended to smear him. Again, the mind boggles what words were being said on these web pages.
It's the fact that if this is supposed to be a one true archive site like archive.org that prides itself on the archive and can explain why it thinks that the copies represent what the site was like at that time.
Apparently there are 695,000 links to archive.today across roughly 400,000 pages on Wikipedia, and they've been saying, well, we kind of like archive.today because it's a bit better in some ways than the Internet Web Archive, archive.org.
But at the same time, we can't trust it anymore.
So they've just reached a consensus to blacklist archive.today and remove all those hundreds of thousands of links, which does mean, unfortunately, some resources will be lost because who else has got a copy of some of these pages.
It's going to be gone forever.
They can spot suspicious logins, they can see dodgy activity, they get the alerts. But here's the problem. Detection isn't enough.
Because when an attacker gets into your Microsoft 365 tenant and starts quietly changing the settings, like disabling conditional access, weakening Defender policies, elevating admin roles, the noise often stops.
And that's when the real damage begins. This is how Microsoft 365 tenant takeovers actually happen. According to CoreView, 63% of tenants are still handing out broad admin rights.
One compromised account and suddenly the attacker has the keys to the kingdom. And if those configurations get tampered with, your backups won't save you.
You could spend weeks trying to rebuild tenant settings by hand because Microsoft doesn't give you a native way to roll back tenant-level changes. Attackers know this.
They count on it. And that's why CoreView has published a new white paper called Total Tenant Takeover: The Microsoft 365 Disaster No One Is Ready For.
It looks at how these attacks unfold in the real world, where least privilege breaks down, and what it actually takes to recover a Microsoft 365 tenant.
Not just files, but the whole environment. You can download it right now at smashingsecurity.com/coreview. That's smashingsecurity.com/coreview.
Duck, what's your story for us this week?
This is ESXi ransomware, so it's not just trying to scramble laptops or even conventional servers.
So the idea here is that it's not so much to steal the data, but to disrupt a business right at its deepest core part so that it has little choice but to pay up.
And I shouldn't laugh, but what this malware known as Nitrogen had, right, was not one but two memory mismanagement bugs.
It turns out that they both trashed the same part of memory. Though I think that was more by accident than by design, since presumably this wasn't supposed to happen at all.
It will still boot up. It's still there so it can show you messages like flaming skulls and you have to pay and even send those messages to your printers.
And all your files are kind of there and visible. So it's a very dark psychological trick that you're nearly but not quite ready to go.
It's just that you don't have any data to run your business.
And more importantly, maybe you wouldn't know where to send the ransom to get your data back.
As an aside, I've heard a lot of people say, oh, it's much worse if you get ransomware that works at the very low level below the operating system and locks up your computer entirely.
But the fact that that didn't take off among ransomware crooks suggests that it doesn't have, as you say, that same psychological pressure.
And as you say, the other reason that generally, if it's a laptop ransomware attack, they want to leave at least your operating system there and your browser so that you can go online and download the Tor browser, the anonymous browser.
And so you can read the new wallpaper with the flaming skull that says, here's how you save your business.
So there's this huge psychological thing about leave the server mostly working make it obvious that the data's still there.
The files have nearly the right name and they have about the right size, but they just won't work. And what you keep secret is the unscrambling key that the victim needs.
Now, we know that these days they tend to steal a whole load of data as well, because they can use that second sort of blackmail leverage saying you're actually paying for a positive.
You get your business running again and a negative that you have to trust us to delete the data. So there's an awful lot of honor that you have to ascribe to thieves.
And historically, as you and I know all too well, the early days of successful ransomware, CryptoLocker, all that stuff about 10 or 12 years ago, for better or for worse, those criminals got a reputation that if you paid up, you probably almost certainly would get your data back.
And that created this mystique that although you were dealing with sleazebags, if you paid, your business probably would get going again if you had no other way forward.
But not in this case.
I think ransomware gangs didn't want people saying, well, I bought this product or I paid for my data to come back and it never did, because that would give them a bad reputation.
That would damage further business in quotes for them, wouldn't it?
But people who hated the fact that as an individual they'd had to pay $300 or maybe $600 if it was a couple, both of whose laptops had got trashed.
And now you've lost your tax returns, you've lost your wedding videos, you've lost the photos of your kids, you've lost all the stuff.
And you think, you know what, if we just scrape together $600 and pay, maybe it'll work out. Well, it wasn't Trustpilot, but did become received wisdom, didn't it?
As much as it might hurt you, as much as it was doing a deal with the devil, if you paid up, you would be okay. And then you could go—
You say, okay, I'll give you a little discount, but I'm only giving you 10 files.
And what the crooks could do, assuming you're online, is they could just then upload that key in some obfuscated way and then delete it from memory on your computer and you'd be none the wiser.
So that's one way that crooks have done it in the past.
But then they have a problem that if the network connection breaks or they can't upload each key or each key for each file or for each computer, then even if you send them the money, they're not going to have a key to send back to you.
And without going into the details of public key cryptography, which sounds like a contradiction in terms, doesn't it?
The idea is that, very loosely speaking, what the public key locks, only the private key can unlock.
And you can go from the private key to the public key, but not the other way around.
And then the crooks say, well, we happen to have the private key that will meld with the public key that obviously you've got, which essentially serves as a victim identifier.
Except that— and I shouldn't laugh— in this case, the buffer overflow bug in the ransomware overwrote the first 4 bytes of the public key.
So even if you pay up, even if the crook's intention was to get your business back on the road and to get you to tell the next people, yeah, I paid and it worked, your money's just gone down the toilet.
Now, the good news is that if you look at recent ransomware history, it looks as though fewer and fewer companies, even when they might be willing, fewer and fewer companies are actually prepared to pay.
They particularly favor affiliates, their name, who have not programming skills, but IT management skills, notably including backup software.
So they trash your backups just in case.
So I think for many companies, they've kind of learned, let's do backup properly, then at least we can get the business going again, whether it's ransomware, fire, flood, whatever it might be.
That's one of the strengths of this algorithm. Everything's neatly 32 bytes big: private key, public key, shared secret. So they're only overwriting 32 bits of it.
As if that wasn't bad enough to prove their incompetence and fecklessness, at some other point they saved the value, apparently, 32. Who knows why?
It just happens to be the length of the key in bytes. Maybe that's what they were doing.
So they overwrote the key with zeros, then they overwrote the same part of the key again with zeros, just in case one bug wasn't bad enough.
Just in case you're thinking it was a minor oversight, it was a double minor oversight.
This is fundamental to their blackmail model, that there is a way to recover because they actually did the cryptography correctly and they didn't have these memory mismanagement buffoonery bugs in their software.
So if they do sell you the private key, how are you ever going to know that they haven't managed to overwrite the first 8 bytes, 16 bytes, 24 bytes of that?
No, that's on your computer because that's the whole idea. So two things to learn from this.
The first is that if you are inclined to think that you could not trust ransomware criminals because they were criminals, here's another reason: they are often incompetent and careless as well.
And of course, the fact the cops bust them in the first place suggests that their own security may not be perfect.
But the other lesson is that when you have things that have happened that make it sound as though something is cryptographically impossible, it might not be.
So don't take the first story you read about something at face value. Always ask an expert.
I think that good news, if you see it that way, is that intrusions by law enforcement and fallings out among ransomware gangs in recent times do seem to have fragmented, if you like, the ransomware— I hate to use the word industry, but the ransomware ecosystem.
That reputation that the first big-time ransomware money-making criminals created 10 or nearly 15 years ago certainly does seem to have been undermined.
I mean, that does happen, and you do sometimes get free tools that let you recover.
But unfortunately, I wouldn't rely on that because when these free decryption tools come out, it often takes days or weeks or maybe even months of work before someone stumbles upon the way of doing it.
And although that means that version of the ransomware is essentially cracked, for a company that's struggling to get back on the road, it's probably too little too late.
So a question for you: what do you worry about at 2 o'clock in the morning when it comes to your company? Company's cybersecurity?
Is it, do we actually have the right controls in place? Is it, are our vendors quietly on fire? Or the truly terrifying one, why are we still trying to do all this with spreadsheets?
Well, if that sounds like you, enter Vanta.
Vanta takes all that painful manual security busywork, chasing audit evidence, filling out questionnaires, updating the same spreadsheet for the thousandth time, and it automates it.
Their trust management platform continuously monitors your systems, pulls everything into one place, and helps keep your security program audit-ready all of the time.
And yes, it uses AI, but in the useful way—flagging risks, streamlining evidence collection, and fitting neatly into the tools you already use.
So you can move faster, scale with confidence, and maybe even sleep through the night. Get started today at vanta.com/smashing. That's V-A-N-T-A.com/smashing.
Smashingsecurity.com/smashing. And thanks to Vanta for supporting the show. And welcome back. Can you join us at our favorite part of the show?
The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security-related necessarily. Well, my pick of the week this week is not security related. I've got a question for you, Duck. Have you ever done yoga?
She was a physical training instructor during the Second World War and a PE teacher afterwards. So she did try and show me how to do yoga once when I was very small.
But I kind of got banished because I just couldn't quite take it very seriously.
Yeah, well, I am all over my warrior pose 1 and warrior pose 2, my cobra, my downward dog, my yoga nidra. Do you know what a yoga nidra is? That's the one I'm best at.
You know, I like all that. But I can't claim to be the most flexible person in the world. But I enjoy doing it, despite not being very good at it.
And I've gone to classes in dusty church halls before.
But what I've noticed is if I were doing the tree pose, for instance, it would be a case of timber rather than, you know, standing tall and proud and sturdy. Wobbly twig.
Yes, I'd be a bit wobbly. So, I've gone to classes before, but what I've started doing is online yoga. And I know that sounds horrible. There's no apps involved.
There are YouTube channels, right, with yoga on. My favourite is something called Yoga with Adriene. Adriene Mishler.
She's got over 13 million subscribers and she's not that annoying. You know, she's kind of, she's all right.
She's got a dog as well who occasionally comes in and says things, well, doesn't say things, but you know, is there in a peaceful kind of yogury way.
We're putting the video on our TV screen, and with our laptop or smartphone, we are FaceTiming with friends and other family members around the country.
So last Friday night, we were doing just that. We were doing our sun salutations.
On our FaceTime, we had our friend Jenna, and we're all watching the same YouTube yoga video at the same time, and we're doing it in different places. This isn't rocket science.
You can sync up the videos using online services. So everyone's watching the video at exactly the same time. But we can see each other.
But it's a fun way to do yoga with people you love and catch up with them afterwards for a chat. And it's something we've introduced into our little routine and I'm enjoying it.
I thought, you know what, maybe some other people like that as well because a bit of yoga, a bit of sort of mindfulness, a little bit of your toes feeling the ground and just being aware of yourself, I think it's good for you as well as your flexibility.
So that is my pick of the week. Duck, what's your pick of the week?
So mine's not going to be quite as uplifting as yours because I would like to have a nitpick of the week, if I may. Oh, yes, you can. That's allowed, is it? Yes.
Of course, because it's me, it does have a cybersecurity kind of implication because it's what I would call crappiness in web programming.
But it's really just the fact that this is 2026. This is supposedly the dawn of AI code that will be perfect and websites that are really a delight to use.
So my annoyance is just a few things. Each one of these happened to me within the last 7 days and it drives me barmy.
And I would love to encourage people to shout back at web services, whether they're government web services, commercial web services, even free ones, about some of the programming stupidity that we have.
For example, you have to put in an email address to use this website. Fair enough.
Maybe they want to email you a confirmation code, or maybe they're saying we'll let you download this document or we'll let you download the software for free, but we want one chance to spam you.
I'm happy with that. So I go to the form and I type in, and as you can imagine, my email address, it starts with P for Paul.
So I press P into the field and immediately 1.7, which is not a legal top-level domain anyway. And it goes, that's fine.
And you just think, well, you want me to trust you with my data.
Maybe if it's a site where you're creating an account to buy something, in a moment, you're going to ask me for my credit card number.
Seriously, as soon as I type in the first letter of my email address, you start bellowing at me that I've entered an invalid email address. You buffoons.
Then many sites these days either invite you or even insist that you give them a phone number.
And it's not every possible phone number, and it's not every possible thing you could dial, because what a lot of people don't realise is the modern phone keypad — you know, think of how it looks even on a modern phone that doesn't have keys, or look at your old phone, there are what, four rows of three columns?
So you can have some letters in phone numbers, but they say don't bother with that. What we would like is phone numbers.
You should be allowed to put either dashes in them the Americans do routinely, or you should be able to put dots in them to space them out — exactly how people say them when they give them to you.
Oh, the other thing they say is that you should encourage people and you should try to get them to enter globally valid phone numbers. And how many websites have you been to?
If you leave a space, it goes, "Nah, you can't do that." Well, remove the spaces then — how hard is it?
And they go, "You can't have a dot." How can you have a dot in a phone number? There's no dot on the keypad.
And then they say, "No, you can't have a plus." Oh no, no, no, no, no, no, no. Oh dear.
You're in somewhere the UK, or maybe you're in a European country — it doesn't matter. But you're not in the United States or Canada.
And maybe you live in a country the UK that is very clearly not a federation. We do not have states and we do not have provinces they do in the US and Canada.
So I put in all my stuff, I put in my address, and then it says, "What is your country?" And I put United Kingdom of Great Britain and Northern Ireland — the longest country name in English in the world.
Oh, is it? Yes, apparently. I can't find a longer one anyway. And then you say, "What is your state/province?" Oh dear. And you have to put something in.
I think, well, England is not a state or a province. I'm happy to put that.
I'm not going to try and be smarty pants and put Northern Ireland or Scotland or something just to freak you out because it's not true.
And so I put things Gondwanaland because, oh, that's fine.
And you know that the only reason that the company is asking for the information is for its own convenience in divvying up the sales leads amongst its sales territories.
And I just think, oh my goodness. So I'll leave the fourth one out because it's more of the same.
It's about reformatting addresses so that they are going from being valid to invalid and not in the correct POST format, and then everybody's happy.
I'm not as het up, I think, about the email thing, character by character, but I can understand why you may be alarmed if it pops up, especially if it comes up in red with a nasty, aggressive, angry little icon at that point.
Well, that just about wraps up the show for this week. Thank you so much, Duck, for joining us for both your story and your nitpick of the week.
I'm sure lots of our listeners would love to find out what you're up to, follow you online — what is the best way to do that?
And don't forget, I'm a good guy to hire to create content for you.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Pocket Casts.
The episodes, show notes, sponsorship info, guest lists, and the entire back catalog of 456 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye. Bye.
You've been listening to Smashing Security with me, Graham Cluley, thanks so much to Duck for joining us. Always wonderful value there.
And to this episode's sponsors, CoreView, Vanta, and ThreatLocker. And of course, to all of you chums who've signed up for Smashing Security Plus over on Patreon.
As members of Smashing Security Plus, they not only get episodes of the podcast earlier than the great unwashed public, and ad-free episodes at that, but they also get the chance to be pulled out of the hat and to be thanked here at the tail end of the show.
So let's reach into the hat right now and give huge thanks to Jane, Henry Walshaw, Adina Bogart O'Brien, Stephen Castle— sounds like a man with wonderful parapets— Yuri Taraday, Bravo Whiskey— almost certainly not their real name, but I live in hope— Alan Liska, Rich— hence he can afford to be a patron— Actually, you don't have to be that rich.
It's only $5 a month or so. Jan, Roy Tate, Alexander Huygois, Lars Bashora, and Jonathan Haddock, who has nothing fishy about him at all. You are all absolute legends.
Thank you so much. If you'd like to join Smashing Security Plus, just head over to smashingsecurity.com/plus for all of the details.
And even if you're not a member, please feel free to like, subscribe, leave a 5-star review, and tell your friends about Smashing Security. Spread the word.
Every little bit helps, and it really does make all the effort worthwhile. Until our next episode, which I hope you're going to tune into, I will say toodaloo for now. Bye-bye.
Host:
Graham Cluley:
Guest:
Paul Ducklin:
Episode links:
- This App Will Detect People Wearing Smart Glasses Near You – Lifehacker.
- Patients listed as dead after major NZ health app MediMap hacked – 1News.
- Why fake AI videos of UK urban decline are taking over social media – BBC News.
- FBI orders domain registrar to reveal who runs mysterious Archive.is site – Ars Technica.
- Archive.today CAPTCHA page executes DDoS; Wikipedia considers banning site – Ars Technica.
- Archive.today is directing a DDOS attack against my blog – Gyrovague.
- Critical buffer overflow bug – in ESXi ransomware – SolCyber.
- Yoga with Adriene – YouTube.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Coreview – Download “Total Tenant Takeover”, a white paper about the Microsoft 365 Disaster No One Is Ready For.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- ThreatLocker – Start your free trial and book a demo of ThreatLocker today to see how you can implement Zero Trust in your environment.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
