InfoSec.Watch

InfoSec.Watch Podcast — Episode 112: Windows Kernel 0-Day, FortiWeb RCE, Akira Targets Nutanix

Infosec.Watch Season 1 Episode 112

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 8:58

Send us Fan Mail

Here’s what we cover in Episode 112:

  • Actively Exploited Windows Kernel 0-Day:
    A privilege-escalation flaw in the Windows kernel is now being abused in real attacks. We cover what’s known, how attackers are chaining it, and the immediate mitigations security teams should prioritize.
  • FortiWeb Critical Vulnerability Added to CISA’s KEV Catalog:
    A newly disclosed remote code execution vulnerability in Fortinet FortiWeb has officially landed in the Known Exploited Vulnerabilities list. We explain exploitation paths, affected versions, and patch timelines.
  • Akira Ransomware Expands to Nutanix Virtualized Environments:
    Akira operators have widened their targeting to include Nutanix AHV systems, giving them deeper access into enterprise virtualization layers. We break down how they’re gaining initial entry and what defenders can harden right now.

Clear explanations. No fluff. Practical takeaways you can use today.

Actionable Cybersecurity Insights — Every Week.
Visit InfoSec.Watch for the full newsletter and links to all sources mentioned in this episode.

Support the show

Thanks for listening to InfoSec.Watch!

Subscribe to our newsletter for in-depth analysis: https://infosec.watch
Follow us for daily updates:
-  X (Twitter)
- LinkedIn 
- Facebook -   

Stay secure out there!