Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @OffTheHook@hackers.town
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sergei and the Westminster Spy Ring - with Carole Cadwalladr and Peter Jukes
Duende Productions Ltd and FlameFlower Studios
As Brexit continues to damage and diminish the UK, and Putin backed Presidential Candidate Donald Trump threatens to return to the White House, Sergei Kristo reveals the Kremlin spy operation that goes back to 2011, and we follow the next decade of information warfare and kompromat with Orwell Prize-winning journalist Carole Cadwalladr and Byline co-founder Peter Jukes Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Fiji Travels; Logitech MX Master 3S Mouse; The ShoeZone Breach; Breached Then Breached Again: The Not SOCRadar Breach; Sponsored by 1Password https://www.troyhunt.com/weekly-update-412/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Great Migration: Living at the Edge of the Solar System | Stories From Space Podcast With Matthew S Williams
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes Someday, humans…
…
continue reading
Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method …
…
continue reading
Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today - Week In Review: August 10, 2024
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43
Cybersecurity Insights: Malvertising, Phishing Trends, and North Korean Hackers In this weekend edition of 'Cybersecurity Today,' host Jim Love brings together experts Terry Cutler from Cyology Labs, David Shipley from Beauceron Security, and Greg Monson from Trustwave. The panel explores the latest trends in cybersecurity, including a deep dive in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Aug. 10-11, 2024. Weekend Update. WCYB Digital Radio.
1:25
1:25
Play later
Play later
Lists
Like
Liked
1:25
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
https://youtu.be/4IWdQ249z_MOn this episode of the podcast, we have another recap from the BlackHat security conference in Las Vegas. This time we discuss a new initiative to protect the world from deepfakes, followed by a penetration testing engagement that proved immutable backups doesn't always mean available backups.…
…
continue reading
https://youtu.be/4IWdQ249z_MOn this episode of the podcast, we have another recap from the BlackHat security conference in Las Vegas. This time we discuss a new initiative to protect the world from deepfakes, followed by a penetration testing engagement that proved immutable backups doesn't always mean available backups.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cutting-Edge Mobile App Security | A Brand Story Conversation From Black Hat USA 2024 | An Appdome Story with Tom Tovar | On Location Coverage with Sean Martin and Marco Ciappelli
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01
Welcome to another insightful story from ITSPmagazine, where we bring you exclusive content directly from Hacker Summer Camp at Black Hat Las Vegas 2024. This year, Sean Martin had the pleasure of sitting down with Tom Tovar, CEO of Appdome, to explore the company’s innovative approach to mobile app security. A Dynamic Presence at Black Hat Black H…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing the Digital Economy: A Deep Dive into Application and API Security | A Brand Story Conversation From Black Hat USA 2024 | An Akamai Story with Rupesh Chokshi | On Location Coverage with Sean Martin ...
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53
In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: CrowdStrike releases Falcon, ransomware as terrorist threat
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest DJ Schleen, distinguished security architect, Yahoo Thanks to our show sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With V…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Deep Fakes to Phishing: Protecting High-Profile Digital Lives and Safeguarding Personal Privacy | A Brand Story Conversation From Black Hat USA 2024 | A BlackCloak Story with Chris Pierson | On Location ...
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28
In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in prote…
…
continue reading
Deep firmware vulnerabilities affect chips from AMD. CISA warns of actively exploited Cisco devices. Solar inverters are found vulnerable to disruption. Iran steps up efforts to interfere with U.S. elections. The UN passes its first global cybercrime treaty. ADT confirms a data breach. A longstanding browser flaw is finally fixed. Crash reports hel…
…
continue reading
Deep firmware vulnerabilities affect chips from AMD. CISA warns of actively exploited Cisco devices. Solar inverters are found vulnerable to disruption. Iran steps up efforts to interfere with U.S. elections. The UN passes its first global cybercrime treaty. ADT confirms a data breach. A longstanding browser flaw is finally fixed. Crash reports hel…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
0.0.0.0, Blacksuit, OpenAI, AWS, Cisco Phones, Win 10, Aaran Leyland, and More... - SWN #405
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42
0.0.0.0, Blacksuit, OpenAI, AWS, Cisco Phones, Win 10, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-405
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Red Teaming and AI Safety - Sounil Yu, Amanda Minnich - ESW #371
2:18:23
2:18:23
Play later
Play later
Lists
Like
Liked
2:18:23
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Red Teaming and AI Safety - Sounil Yu, Amanda Minnich - ESW #371
2:18:23
2:18:23
Play later
Play later
Lists
Like
Liked
2:18:23
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
…
continue reading
In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally. Impactful Moments: 00:00 - Welcome 00:56 - Hello From Vegas! 01:41 - Conference Anxiety 03:43 - Origins of Black Hat 06:17 - Which Conference? 08:18 - Conference Strategy 11:47+ - You Can O…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ask Me Anything, Theresa Payton. Budget-Friendly Investigation Tools. Sponsored By Pipl.
4:24
4:24
Play later
Play later
Lists
Like
Liked
4:24
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Aug. 9, 2024. ADT Reports Cyber Incident. WCYB Digital Radio.
1:17
1:17
Play later
Play later
Lists
Like
Liked
1:17
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Aug. 9, 2024. Airport Introduces Facial Recognition. WCYB Digital Radio.
2:51
2:51
Play later
Play later
Lists
Like
Liked
2:51
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How To Report A Cybercrime In Michigan or Anywhere in the U.S.
1:34
1:34
Play later
Play later
Lists
Like
Liked
1:34
For every citizen and business in the United States, cybercrime is a growing – and perhaps inescapable – threat. So, what do you do if you or someone you know falls victim to a cyberattack, data breach, or hack? The researchers at Cybercrime Magazine encourage you to file a complaint with the FBI’s Internet Crime Complaint Center and the appropriat…
…
continue reading
On this episode - Getting creepy face-time with your favorite sports team, banking in India makes a serious security move, and subtracting four zeroes for security. So much to hit on this edition of The Checklist brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com…
…
continue reading
Overview This week we take a deep dive behind-the-scenes look into how the team handled arecent report from Snyk’s Security Lab of a local privilege escalationvulnerability in wpa_supplicant plus we cover security updates in PrometheusAlertmanager, OpenSSL, Exim, snapd, Gross, curl and more. This week in Ubuntu Security Updates 185 unique CVEs addr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chameleon malware reappears, Rhysida hospital attack, Blacksuit’s $500m tally
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19
Chameleon reappears targeting Canadian restaurant chain Rhysida claims attack on Bayhealth Hospital in Delaware BlackSuit/Royal achieves $500m in ransomware demands Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With V…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
155. Mic Drop: Researcher Nina Jankowicz on Fox News, defamation, and our new information reality
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12
The latest on disinformation researcher Nina Jankowicz’s defamation lawsuit against Fox News — and why the Dominion Voting Machine settlement doesn’t necessarily help her case.By Recorded Future News
…
continue reading
![Artwork](/static/images/128pixel.png)
1
155. Mic Drop: Researcher Nina Jankowicz on Fox News, defamation, and our new information reality
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12
The latest on disinformation researcher Nina Jankowicz’s defamation lawsuit against Fox News — and why the Dominion Voting Machine settlement doesn’t necessarily help her case.By Recorded Future News
…
continue reading
![Artwork](/static/images/128pixel.png)
1
One of the largest data breaches in history? Cyber Security Today for Friday, August 9th, 2024
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20
Massive Data Breach, Outlook's Phishing Risk, and Windows Downgrade Attack Vulnerabilities In this episode of Cybersecurity Today, host Jim Love delves into one of the largest data breaches in history involving 2.9 billion records leaked without user consent by National Public Data. He also covers the backlash against Microsoft Outlook's email inte…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Introducing Substrate—An Open-source Framework for Human Understanding, Meaning, and Progress
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37
This video introduces Substrate—An Open-source Framework for Human Understanding, Meaning, and Progress. Substrate is a crowdsourced project designed to enhance understanding, communication, and action in order to move humanity forward. Read the Article: 📃 https://danielmiessler.com/p/introducing-substrate TOPICS: Introduction to Substrate (00:00:0…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Insider Insights: Cybersecurity and Collaboration | A Brand Story Conversation From Black Hat USA 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli ...
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44
Welcome to Hacker Summer Camp Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Leve…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Balancing Integrity and Sales: The Dual Role of Field CISOs | CISO Circuit Series: Episode 5 with Black Hat USA 2024 Event Coverage | Michael Piacente and Sean Martin on the Redefining CyberSecurity Podcast ...
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06
About the CISO Circuit Series Sean Martin and Michael Piacente will join forces roughly once per month to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dynamic Access Control in Modern Cloud Environments | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Artyom Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli ...
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
In this On Location episode Brand Story, Sean Martin speaks with Artyom Poghosyan at the Black Hat conference in Las Vegas about Britive, a cloud privileged access management platform. They explore how Britive assists medium to large enterprises in tackling identity management and security issues across multi-cloud and hybrid environments. Sean and…
…
continue reading
Exploring Anti-Phishing Measures in Microsoft 365 https://certitude.consulting/blog/en/o365-anti-phishing-measures/ SSHamble Security Testing Tool https://www.runzero.com/blog/sshamble-unexpected-exposures-in-the-secure-shell/ macOS Sequoia Weekly Permission Prompts https://9to5mac.com/2024/08/06/macos-sequoia-screen-recording-privacy-prompt/ .inte…
…
continue reading
Exploring Anti-Phishing Measures in Microsoft 365 https://certitude.consulting/blog/en/o365-anti-phishing-measures/ SSHamble Security Testing Tool https://www.runzero.com/blog/sshamble-unexpected-exposures-in-the-secure-shell/ macOS Sequoia Weekly Permission Prompts https://9to5mac.com/2024/08/06/macos-sequoia-screen-recording-privacy-prompt/ .inte…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
UL NO. 444: Pizza Meter Intelligence, China Bypasses Bans, Securing AWS Secrets…
24:47
24:47
Play later
Play later
Lists
Like
Liked
24:47
What to expect at Blackhat/DEFCON, Identifying Explosives, OpenAI's new models, Llama 4 Timeline, and more… ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Foll…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Coro's Modular Cybersecurity and True Platform Revolution | A Brand Story Conversation From Black Hat USA 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli ...
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37
At Black Hat 2024 in Las Vegas, Sean Martin from On Location interviews Dror Liwer of Coro, uncovering the impressive strides Coro has made in creating a truly cohesive cybersecurity platform. This conversation reveals how Coro distinguishes itself in an industry saturated with buzzwords and inadequate solutions, particularly for smaller and mid-si…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity leaders gear up for the ultimate test.
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the li…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity leaders gear up for the ultimate test.
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the li…
…
continue reading
https://youtu.be/cEiPjW_STUUOn this episode of the podcast, we cover our two favorite briefings from the first day at the Black Hat security conference. We start with our thoughts on "shadow resources" in cloud environments before giving an update to last week's episode with additional research into AI-as-a-Service attacks.…
…
continue reading
https://youtu.be/cEiPjW_STUUOn this episode of the podcast, we cover our two favorite briefings from the first day at the Black Hat security conference. We start with our thoughts on "shadow resources" in cloud environments before giving an update to last week's episode with additional research into AI-as-a-Service attacks.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Special: LIVE from BlackHat 2024, Unauthorized RMM Useage, DEF CON 32 Preview
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53
In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest Lead Threat Hunter Colin Ferris LIVE on the BlackHat show floor in Las Vegas to discuss: Takeaways from BlackHat CISO Summit ReliaQuest presentation on Remote Monitoring & Management (RMM) tools Things to look forward to at DEF CON 32…
…
continue reading
Links: https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf https://www.theregister.com/2024/08/05/crowdstrike_is_not_at_all/ https://www.theverge.com/2024/8/6/24214371/microsoft-delta-letter-crowdstrike-response-comments https://www.linkedin.com/posts/alexstamos_why-crowdstrikes-baffli…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Downgrades and Attacking Security Things & Things Not to Miss at BH/DC - Trent Lo - PSW #838
3:07:57
3:07:57
Play later
Play later
Lists
Like
Liked
3:07:57
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Learn what is most interesting at hacker summer camp this year! Visit https://www.securitywee…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Behind the Scenes of SquareX's Exposing DEF CON Talk and Their Latest Browser Security Innovations | A Brand Story Conversation From Black Hat USA 2024 | A SquareX Story with Vivek Ramachandran | On Location ...
20:21
20:21
Play later
Play later
Lists
Like
Liked
20:21
In this Brand Story episode, Sean Martin gets to chat with Vivek Ramachandran, Co-Founder and CEO of SquareX, at the Black Hat USA conference in Las Vegas. The discussion centers around SquareX’s innovative approach to browser security and its relevance in today’s cybersecurity landscape. Vivek explains that SquareX is developing a browser-native s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Safety. Lessons From A Real-Life Phishing Incident. Scott Schober, Author, "Hacked Again."
3:42
3:42
Play later
Play later
Lists
Like
Liked
3:42
In this episode of Cyber Safety, Scott Schober, author of "Hacked Again," talks to listeners about a real-life phishing incident and breaks down some lessons we can learn from the story. To learn more about ransomware and more about cybersecurity, visit us at https://cybersecurityventures.comBy Cybercrime Magazine
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From FBI Target To Cyber Defender. Teen Hacker's Redemption. Marc Maiffret, CTO, BeyondTrust.
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11
Marc Maiffret is the Chief Technology Officer at BeyondTrust. In this episode, he joins host Heather Engel to discuss his past as a teenage hacker, including his experience at age 17 being raided by the FBI, before transitioning into a career as a security researcher and ethical hacker today. • For more on cybersecurity, visit us at https://cyberse…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unsecurity Episode 223: Introducing a New Host and Breaking Down the Crowdstrike Saga
33:58
33:58
Play later
Play later
Lists
Like
Liked
33:58
In this episode of the Unsecurity Podcast, Brad and Oscar are joined by a new host, FRSecure's Megan Larkins! Together, they discuss the recent CrowdStrike outage and its illustration of the importance of understanding your application inventory and dependencies—and the need for proper application allow listing and conditional access policies to pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Aug. 8, 2024. McLaren Health Care Cyberattack. WCYB Digital Radio.
1:20
1:20
Play later
Play later
Lists
Like
Liked
1:20
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Aug. 8, 2024. Data Of 3 Billion People Stolen In Hack. WCYB Digital Radio.
2:54
2:54
Play later
Play later
Lists
Like
Liked
2:54
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Magazine Update: National Cybersecurity Alliance. 'Kubikle' Video Web Series & More.
4:01
4:01
Play later
Play later
Lists
Like
Liked
4:01
National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world. They advocate for the safe use of all technology and educate everyone on how best to protect ourselves, our families, and our organizations from cybercrime. In this episode, host Paul John Spaulding is joined by Steve Morgan, Fou…
…
continue reading