DiscoverCyber Security HeadlinesHackers use Hyper-V, Cisco UCCX flaw, The Louvre's password
Hackers use Hyper-V, Cisco UCCX flaw, The Louvre's password

Hackers use Hyper-V, Cisco UCCX flaw, The Louvre's password

Update: 2025-11-07
Share

Description

Hackers use Windows Hyper-V to evade EDR detection

Critical Cisco UCCX flaw lets attackers run commands as root

The Louvre's video security password was reportedly Louvre 

Huge thanks to our sponsor, ThreatLocker

Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.

Find the stories behind the headlines at CISOseries.com.

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Hackers use Hyper-V, Cisco UCCX flaw, The Louvre's password

Hackers use Hyper-V, Cisco UCCX flaw, The Louvre's password