Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
We Cover the Cyberspace.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
We do reviews of movies, series, shows and animation shows and film from streaming entertainment giant Netflix. Tune in to find out what's what, like what to watch and what not to watch! SPOILER ALERT! Check out our other show; https://theenglishgame.transistor.fm/
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Discussing all things tech and simplifying concepts for those new to tech.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Compelling conversations with Tech Industry leaders.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
The podcast by the Linux Mint community for all users of Linux
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
…
continue reading
1
121. Mic Drop: A unusual peek inside a North Korean malware lab
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43
North Korea has a unique way of testing malware — they are less concerned about getting it right than getting it out… a kind of “smash-and-grab” approach to cyber attacks. Sentinel One’s Tom Hegel explains.By Recorded Future News
…
continue reading
1
CISA malware analysis, "hunt forward" missions, Spectre v2
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
CISA expands automated malware analysis US Cyber Command launched “hunt forward” missions Spectre v2: Linux Boogaloo CHECK OUT Capture the CISO season 2 here. Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks …
…
continue reading
First up in the news: Red Hat Announces Nova Graphics Driver for NVIDIA GPUs, Blender 4.1 released, MakuluLinux brings LinDoz back this time with AI, the end of EXT2 In security and privacy: Backdoor found in widely used Linux utility breaks encrypted SSH connections, Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices Then…
…
continue reading
1
Cyber Security Today, March 27, 2024 - A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from open source repositories
9:44
9:44
Play later
Play later
Lists
Like
Liked
9:44
This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet, and moreBy ITWC
…
continue reading
1
Configuration Manager Security Concerns! Apple Opens Talks with AI Vendors! Fujitsu Malware Breach!
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43
On this episode of the podcast, I cover several security related stories including an interesting study about Microsoft Configuration Manager security concerns, a recent admission from Fujitsu about a breach, an announcement from Microsoft on the next Office LTSC version and more!Reference Links:https://www.rorymon.com/blog/configuration-manager-se…
…
continue reading
We start this episode with Joseph's latest fly-on-the-wall investigation into the Com, the nebulous online entity and culture that is linked to some of the most high profile and brazen data breaches in recent history. Joseph sat in their chatrooms while rival hackers and criminals doxed and physically robbed one another. A true melding of digital a…
…
continue reading
1
E188 | WOODY WOODPECKER GOES TO CAMP (movie review)
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09
After being expelled from the forest, Woody believes he has found a permanent home at Camp Woo Hoo. However, his hopes are dashed when an inspector threatens to close the camp unless Camp Woo Hoo triumphs in the annual survival game against Camp Woo Rah—a competition Camp Woo Hoo has never won..
…
continue reading
1
Cyber Security Today, April 17, 2024 - More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner, and more
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetingsBy Howard Solomon
…
continue reading
1
Cisco MFA breach, Bad Bots surge, LockBit 3.0 propagates
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38
Cisco announces breach of multifactor authentication message provider Bad bots drive 10% annual surge in account takeover attacks LockBit 3.0 variant generates custom, self-propagating malware Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sh…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
Mal is the manager of England's homeless football team, taking his players to Rome with the hope of being crowned champions of the Homeless World Cup. He brings with them a talented striker, Vinny, who could give them a real chance at winning.
…
continue reading
1
Threads out in Turkey, Palo Alto backdoor, Microsoft' security overhaul
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Meta to close Threads in Turkey Palo Alto fixes backdoor zero-day Details on Microsoft’s security overhaul Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on sales. As infosec teams become hands on in the sales cycle, proving your value becomes key. A director of GRC said la…
…
continue reading
1
122. The UK-US unmasked a giant Chinese cyber operation but forgot one thing: to tell many of its victims
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
The US and UK made a splashy coordinated announcement last month about a years-long cyber espionage campaign by Chinese state-backed hackers. The US indicted seven, the UK leveled sanctions. They just neglected to do one thing --- let some of the victims know.By Recorded Future News
…
continue reading
A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substac…
…
continue reading
1
Potential New VMware EUC Name! Cloud Provider Cost Cuts! New Citrix Deal!
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05
On this episode of the podcast, I cover a potential name change for VMware EUC, a new partnership deal for Citrix, multiple vulnerability disclosures for vulnerabilities with a 10 out of 10 on the severity scale and more!Reference Links:https://www.rorymon.com/blog/potential-new-vmware-euc-name-cloud-provider-cost-cuts-new-citrix-deal/…
…
continue reading
Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. …
…
continue reading
1
Cyber Security Today, April 15, 2024 - Act fast to a plug hole in Palo Alto Networks firewall, Canadian comedy festival loses over $800K in email scam, and more
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04
This episode reports on a new anti-ransomware strategy, and moreBy Howard Solomon
…
continue reading
1
Using Australian cyber regulation as a global blueprint for tackling crime, with Rapid7’s Sabeen Malik
53:00
53:00
Play later
Play later
Lists
Like
Liked
53:00
In this episode of the Cyber Uncut podcast, Sabeen Malik, vice-president of global government affairs and public policy at Rapid7, joins Liam Garman to discuss the changing nature of global tech policy – applauding Australia’s stringent cyber security legislation. The pair begin the podcast by discussing Malik’s time developing tech policy within t…
…
continue reading
1
U.S. surveillance reauthorization, Roku breach update, Microsoft breach exposed agencies
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
House passes reauthorization of U.S. surveillance program Roku says 576,000 accounts compromised in latest security breach Microsoft breach exposed federal agencies Thanks to today's episode sponsor, Conveyor It’s Conveyor again, the market-leading AI software for answering security questionnaires and securely sharing your security posture and docu…
…
continue reading
1
Linux Backdoor Infection Scare, Massive Social Security Number Heist
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor. The episode further delves into a cybersecurity incident where hackers stole 340,000 social secur…
…
continue reading
Once every year, Check Point releases an annual report reviewing the biggest events and trends in cybersecurity. In this episode we'll break down the latest iteration, focusing on its most important parts, to catch you up on what you need to know most in 2024.By PI Media
…
continue reading
1
Breaking down a high-severity vulnerability in Kubernetes.
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45
Tomer Peled, a Security & Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster. The research states…
…
continue reading
1
Week in Review: Government hospital warning, Sisence breach, Financial firms lose $12b
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Mike Levin, deputy CISO, 3M Thanks to our show sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated fast. With Vanta, you can automate compliance for in-demand frameworks like…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 12, 2024
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10
This episode features a discussion on Microsoft's cybersecurity troubles, worries about open source, a warning about abusing IT help desks to launch attacks and moreBy Howard Solomon
…
continue reading
1
Checklist 371 - AI and (Probably) Pegasus Re-Revisited
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11
More news of AI tools and shenanigans powered by AI tools. It is an election year, after all. Also - Apple’s let people in 92 countries know that somebody’s trying to take over their iPhones. It is an election year, after all. We’ll tell you more on Checklist No. 371, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist An…
…
continue reading
1
CYFIRMA Research: Tracking Ransomware- March-2024
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42
Stay ahead of cybersecurity trends with CYFIRMA's March 2024 Ransomware Report. Lockbit, despite a decline in infections, continues to dominate. The manufacturing sector is a primary target across the globe. Notably, the USA remains a primary victim, trailed by Canada, the UK, Germany, and Spain. Witness the evolution of ransomware tactics as group…
…
continue reading
1
Cyber Security Today, April 12, 2024 - A warning to Sisense customers, a new tactic for spreading the Raspberry Robin worm, and more
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43
This episode reports on a new way threat actors are planting malware on GitHub, why you should watch for the running of unexpected automated scripts on your network, and moreBy Howard Solomon
…
continue reading
1
Palo Alto patches, CISA’s Sisense warning, GitHub repos gamed
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45
Palo Alto Networks fixes several DoS vulnerabilities in PAN-OS operating system Sisense breach exposes customers to potential supply chain attack Threat actors gaming GitHub Search Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for…
…
continue reading
1
TNW 332: FCC Requires Broadband 'Nutrition Labels' - Humane's AI Pin, Apple Repair, Sunshine
1:02:32
1:02:32
Play later
Play later
Lists
Like
Liked
1:02:32
Humane's AI pin has arrived! Apple is expanding repair options with support for used genuine parts. The FCC is rolling out 'Consumer Broadband Labels'. And former CEO Marissa Mayer has a new photo app called Sunshine, powered by AI. Amanda Silberling of TechCrunch joins Mikah to talk about Humane's AI Pin, now available for purchase, along with a s…
…
continue reading
Power grid security expert Joe Marshall joins the crew today to talk all things, well, power grid security. But not before he gets an impromptu pop quiz from Matt in the roundtable. Joe then tells some stories from his days working in electric utility, deploying new systems and his experiences with pentesting teams ("Wow, y'all need to stop!"). Plu…
…
continue reading
1
CYFIRMA Research- A New Campaign Identified Targeting Individuals in South Asia
4:28
4:28
Play later
Play later
Lists
Like
Liked
4:28
Cyfirma’s latest research uncovers a sophisticated cyber threat targeting individuals in South Asia. Our research team identified a malicious campaign involving a deceptive SFX archive executable. These files, embedded in the malicious binary and decoy PDF, are part of a multifaceted attack aimed at infiltrating systems and executing malicious acti…
…
continue reading
In our Innards section: Using the Linux Mint Backup Tool and backing up applet settings And finally, the feedback and a couple of suggestions 00:00:00 – Intro 00:01:00 – Innards 00:26:39 – Vibrations from the Ether 00:34:38 – Check This Out 00:36:38 – Housekeeping and Announcements 00:37:47 – Wrap Up 00:41:00 – Outtro Full Show Notes Here Contact I…
…
continue reading
We start the episode with an announcement: we've brought on our first 404 Media fellow Jules Roscoe! They did amazing work at Motherboard, and we're stoked to have them on board to cover labor for us and getting our work to audiences wherever they are. As for this week's stories, we start with Jason's wild one about grifters who are taking influenc…
…
continue reading
1
Ukraine cyber head suspended, LG TV vulns, Microsoft exposed passwords
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55
Ukraine's head of cybersecurity suspended and assigned to combat zone Over 90,000 LG Smart TVs exposed to remote attack Microsoft exposed internal passwords in security lapse Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-de…
…
continue reading
1
Cyber Security Today, April 10, 2024 - RansomHub gang trying to extort Change Healthcare, large number of Microsoft security updates are released, and more
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
This episode reports on a warning to application developers using the Rust language, the need to unplug end of life D-Link NAS devices, and more
…
continue reading