4.6 • 1K Ratings
🗓️ 8 November 2025
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:10.1 | At TALIS, they know cybersecurity can be tough and you can't protect everything, |
| 0:17.6 | but with TALIS, you can secure what matters most. |
| 0:23.2 | With TALIS's industry-leading platforms, you can protect critical applications, data, and identities, anywhere and at scale with the highest |
| 0:29.7 | ROI. That's why the most trusted brands and largest banks, retailers, and healthcare companies in the |
| 0:36.1 | world rely on Talis to protect what matters most. Applications, retailers, and healthcare companies in the world rely on Talis to protect what matters most. |
| 0:40.0 | Applications, data, and identity. |
| 0:42.6 | That's Talis. |
| 0:44.0 | T-H-A-L-E-S. |
| 0:45.8 | Learn more at Talisgroup.com slash cyber. |
| 0:50.0 | Thank you. Hello, everyone, and welcome to the Cyberwires Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, |
| 1:14.3 | solving some of the hard problems and protecting ourselves in a rapidly evolving cyberspace. |
| 1:20.1 | Thanks for joining us. |
| 1:26.7 | So Rusty Burles is actually just from the languages that the vulnerability uses, right? |
| 1:33.7 | The vulnerability is in two language extensions in Postgres, and those language extensions are Rust and Pearl. |
| 1:42.4 | So if you're imagining, you can either imagine like, |
| 1:46.1 | you know, a rusty pearl kind of like, think Pirates of the Caribbean, or you can imagine |
| 1:51.6 | the language extensions, the different, different syntaxes and whatnot. |
| 1:57.3 | Our guest today are Tal Pellig, senior product manager and Kobe Abrams, cybersecurity researcher at Veronis. |
| 2:05.0 | The research we're discussing is titled Rusty Pearl, Remote Code Execution in Postgres instances. |
| 2:16.6 | Tal, could you walk us through what remote code execution vulnerabilities mean when it comes to Postgres and what that means for organizations? |
| 2:27.6 | Sure. So a Postgres database, usually you can execute queries on them. Sometimes you have a web |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.