Best security vulnerabilities podcasts we could find (Updated January 2018)
Related podcasts: Security Vulnerability Threat Malware Hacking Tech Vrt Snort Talos Zeroday Vuln Physical Cisco Exploits 0 Geopolitical Dev Human Intelligence Day  
Security vulnerabilities public [search 0]
show episodes
 
S
Security Wire Weekly
Rare
 
The cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.
 
I
InfoSec Daily Podcast
Monthly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
C
Cisco Security Intelligence Operations: Cyber Risk Report Podcast
 
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
 
B
Beers with Talos Podcast
Monthly+
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
B
Beers with Talos Podcast
Monthly+
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
T
The Checklist by SecureMac
Weekly
 
SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!
 
T
Tenable Network Security Podcast
Monthly+
 
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
 
S
Security Weekly TV
Weekly+
 
Information security news, research, vulnerabilities, hacking, and how-tos!
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
B
Beers with Talos Podcast
Weekly+
 
Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
H
Hack Naked News (Audio)
Weekly
 
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
 
T
TrustedSec Security Podcast
Monthly+
 
The TrustedSec Security Podcast is our contribution back to the community where we will discuss the vulnerabilities of interest, information security related news and review useful tools that will hopefully provide you a few laughs and a little knowledge.
 
M
McAfee's 2Minute Warning ™ Daily Security Briefing
 
A daily news service that keeps you up-to-date on security issues, new threats and steps to defend networks against cyber attacks
 
T
The Ashimmy Blog
Daily+
 
Writings on work, kids and network security
 
S
Security Conversations - A SecurityWeek Podcast
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
C
Cisco Security Intelligence Operations: Cyber Risk Report Podcast
 
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
 
T
Tenable Network Security Podcast
Monthly+
 
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
 
C
Cisco Security Intelligence Operations: Cyber Risk Report Podcast
 
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
 
C
Cisco Security Intelligence Operations: Cyber Risk Report Podcast
 
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
 
I
Inside Out Security
Weekly
 
Our podcast takes up the big questions of security, risk, and vulnerabilities. A weekly discussion with experts and the Varonis team. Follow us: @infosec_podcast
 
T
TrustedSec Security Podcast
Monthly
 
The TrustedSec Security Podcast is our contribution back to the community where we will discuss the vulnerabilities of interest, information security related news and review useful tools that will hopefully provide you a few laughs and a little knowledge.
 
R
Risk & Repeat
Weekly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
B
Beers with Talos Podcast
Weekly+
 
Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
O
Optimal Security Podcast Series
Monthly+
 
Organizations are facing a growing and rapidly evolving set of security threats, including: IT outsourcing, cybercrime, workforce mobility, Web 2.0, and data breaches. Lumension is the leading provider of operational endpoint security solutions that help protect your vital information and manage your critical risk across network and endpoint assets. Lumension delivers Vulnerability Management, Endpoint Protection, Data Protection, and Compliance and IT Risk Management solutions to more than ...
 
I
InfoSec Daily Podcast
Weekly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
S
Scared Sh!tless
Monthly+
 
To survive in today's world you have to stay connected. But do the benefits really outweigh the risks? Your smartphone, the Internet, social media accounts and all other facets of your tech-connected life make you vulnerable to hackers and cyberattacks. In this podcast, we speak with world-leading cybercrime experts to examine the frightening risks we unknowingly take every day, and how those risks impact our personal security and privacy.
 
S
Secure Ninja TV
Daily+
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
 
B
Beards in Security
Monthly
 
Beards in Security is a bi-weekly podcast featuring Matt Berry and Anthony Mannarino who cover IT security news, security program development, vulnerabilities, research, and related topics of interest for the information security community.
 
V
VAM Talks
Rare
 
Food security analysis, also known as Vulnerability Analysis and Mapping (VAM), is a core function of the World Food Programme's (WFP’s) work. VAM analyses the food security situation and answers some critical questions: WHO is food insecure or vulnerable? HOW MANY are there? WHERE do they live? WHY are they food insecure or vulnerable? HOW is the situation likely to evolve and what are the risks threatening them? WHAT should be done to save their lives and livelihoods?
 
S
Serious About Security
Weekly
 
Preston Wiley, Mike Hill, and Keith Watson discuss interesting topics in information security and privacy. This biweekly podcast covers topics that range from the latest software vulnerabilities to security tools to legal issues. The Serious about Security Podcast is brought to you by the Greater Lafayette Security Professionals (GLSP) group, Secure Purdue, and the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.
 
S
Solomon Success » Podcast
Monthly
 
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
 
S
Security Bites
Monthly+
 
Backdoors, pharming, botnets, phishing, rootkits,viruses, worms. Feeling vulnerable? CNET.com's Robert Vamosi will tell you about the latest security threats, what's coming, and how to protect your system. Visit the blog at http://securitybites.cnet.com.
 
T
Tenable Network Security Podcast
Monthly+
 
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
 
C
Cyber Security Documentary
Daily+
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work.Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize i ...
 
C
Cisco Security Intelligence Operations: Cyber Risk Report Podcast
 
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
 
R
Refugee Stories: In Their Own Voices
 
In eight compelling episodes, this podcast covers the most pressing and misunderstood aspects of the U.S. Refugee Admissions Program, including how security vetting actually works, the economic impact of refugees, the history of U.S. immigration and continuing pattern of fear and vilification of newcomers, faith perspectives, veteran perspectives, and the current status and future of the global migration crisis that has rivaled the historical migrant flows of WWII and continues to rise today ...
 
Loading …
show series
 
F
Fintech Insider by 11:FS
 
First up on today's news show, the FCA bans BYOD (Bring Your Own Device) across the the entire UK finance sector. Whilst regulation is on the tip of everyone's tongue, cryptocurrencies managed to sneak their way onto the show once more as Kodak launched KODAKcoin, boosting stock prices an outrageous 44%. From one major announcement to another, ...…
 
Two of the worst vulnerabilities in years are slowly being fixed—but at a cost to consumers and companies alike. https://www.wired.com/story/meltdown-and-spectre-patches-take-toll Branch's services Spectre and Meltdown patches manipulated to leak data before Meltdown and Spectre were officially revealed update published benchmark and user data ...…
 
It is fairly common for pentesters to discover Cross-Site Scripting (XSS) vulnerabilities on web application assessments. Exploiting these issues potentially allow access to a user’s session tokens enabling attackers to navigate a site as the victim in the context of the web application. In this episode the hosts Beau Bullock (@dafthack) & Mike ...…
 
German researchers say that a flaw in the app's group-chat feature undermines its end-to-end encryption promises. https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats end-to-end encryption to every conversation paper on the group messaging vulnerabilities used it to organize the campaign against abusers…
 
Meltdown and Spectre; two vulnerabilities that affect the majority of computers and portable devices in circulation, need software and perhaps hardware fixes to be secure. Josh discuss an interview he conducted with a security researcher on some particularly malicious adware/malware. We also answer some reader email, and explain what "hashing" ...…
 
Launchpad Studio, a product development acceleration program focused on helping machine learning startups iterate quickly, fail fast, and collaborate on best practices. Malika Cantor and Peter Norvig talk with Mark and Melanie this week about how the Launchpad Studio program is helping startups overcome data, expertise and tooling barriers by p ...…
 
Launchpad Studio, a product development acceleration program focused on helping machine learning startups iterate quickly, fail fast, and collaborate on best practices. Malika Cantor and Peter Norvig talk with Mark and Melanie this week about how the Launchpad Studio program is helping startups overcome data, expertise and tooling barriers by p ...…
 
B
Bad Voltage » Ogg Vorbis
 
Jeremy Garcia, Jono Bacon, and Stuart Langridge present Bad Voltage, in which we look down the barrel of 2018, 2018 gazes back into us spectrally and meltdownily, nobody shines Jono’s shoes for him, and: [00:02:30] The news: the Spectre and Meltdown security vulnerabilities are here to eat the world — you know that a security issue is serious w ...…
 
B
Bad Voltage » Ogg Vorbis
 
Jeremy Garcia, Jono Bacon, and Stuart Langridge present Bad Voltage, in which we look down the barrel of 2018, 2018 gazes back into us spectrally and meltdownily, nobody shines Jono’s shoes for him, and: [00:02:30] The news: the Spectre and Meltdown security vulnerabilities are here to eat the world — you know that a security issue is serious w ...…
 
Jeremy Garcia, Jono Bacon, and Stuart Langridge present Bad Voltage, in which we look down the barrel of 2018, 2018 gazes back into us spectrally and meltdownily, nobody shines Jono’s shoes for him, and: [00:02:30] The news: the Spectre and Meltdown security vulnerabilities are here to eat the world — you know that a security issue is serious w ...…
 
In case you missed it Going back on its earlier stand, the Central government requested the Supreme Court to recall its order that made playing of the National Anthem compulsory in cinema halls. The affidavit, submitted by the Ministry of Home Affairs, apprised the Court of setting up an Inter-Ministerial Committee to frame new guidelines on pl ...…
 
On Thursday October 5, 2017, I sent the secretary of the VA, David Shulkin, an email titled “Repeatedly VIOLATED by corrupt VBA managers through privacy breaches – I respectfully request your assistance.” I then forwarded the same email I had sent to Shulkin, to Thomas Murphy, Acting Under Secretary for Benefits, and Vivieca Wright Simpson, Chi ...…
 
C
Colorado = Security Podcast
 
In this episode: Sue Lapierre, CISO for Prologis, is our guest this week. News from: Qdoba, Marketo, Convercent, OverWatchID, Swimlane, NCC, DirectDefense and a lot more!Meltdown and Spectre are kind of a big dealNot exactly the quietest start to a year so far, huh? This week brought us one of the biggest vulnerability disclosures we've seen in ...…
 
I've got a couple of announcements to tell you, then a listener story from David Bogdan from Japan, and one from Denise Crown. At that point I'm going to hand you over to Bart and me in Security Bits because there was so much to talk about with so many big stories. We'll talk about password managers being used as trackers, the IOHIDeous vulnera ...…
 
A
All TWiT.tv Shows (Audio)
 
Summarizing the Meltdown and Spectre security vulnerabilities in modern computers, explaining the 911 usage of Amazon's Echo Connect, Scott Wilkinson hinting at something intriguing coming to consumer television, using CRM (Customer Relationship Management) software for a small business mailing list, transferring iPhone 5 data to a new iPhone 8 ...…
 
R
Radio Leo (Audio)
 
Summarizing the Meltdown and Spectre security vulnerabilities in modern computers, explaining the 911 usage of Amazon's Echo Connect, Scott Wilkinson hinting at something intriguing coming to consumer television, using CRM (Customer Relationship Management) software for a small business mailing list, transferring iPhone 5 data to a new iPhone 8 ...…
 
The hottest trends to expect at CES, plus smart toilets. Which is one of the hot trends at CES actually. Tom Merritt, Sarah Lane, Roger Chang, Len Peralta and Allison Sheridan. MP3 Using a Screen Reader? Click here Multiple versions (ogg, video etc.) from Archive.org. Please SUBSCRIBE HERE. Follow us on Soundcloud. A special thanks to all our s ...…
 
This week, Doctors make the best rappers, 3 innovative security companies, Devops will be a thing, integrate products swimmingly, AI and Machine Learning in the hands of bad actors, and serverless security capabilities. Our topic segment today will discuss Patching Intel Vulnerabilities In The Enterprise. All that and more on Enterprise Securit ...…
 
This week, Doctors make the best rappers, 3 innovative security companies, Devops will be a thing, integrate products swimmingly, AI and Machine Learning in the hands of bad actors, and serverless security capabilities. Our topic segment today will discuss Patching Intel Vulnerabilities In The Enterprise. All that and more on Enterprise Securit ...…
 
This week on Channel 9, Christina discusses the week's top developer news, including; [00:11] Meltdown and Spectre [Graza University] [00:50] Securing Azure customers from CPU vulnerability [Microsoft Azure] [01:08] Mitigating speculative execution side-channel attacks in Microsoft Edge and Internet Explorer [Microsoft Edge Team] [01:29] Asynch ...…
 
Whether or not to freak out about the new chip vulnerabilities, or whether to freak out about the Indian citizen database breach OR whether you should freak out about oil-filled artificial muscles for robots and prosthetics. With Sarah Lane, Tom Merritt and Roger Chang. MP3 Using a Screen Reader? Click here Multiple versions (ogg, video etc.) f ...…
 
Don’t have time to keep a tab on news throughout the day? CNN-News18 brings you the day’s top news and newsmakers in less than 3 minutes! Here are today’s top picks: India strikes back, kills over 10 Pakistan rangers, India takes revenges of its BSF jawan killed on birthday, Pakistan releases video of Kulbhushan Jadhav, Speculations of Jadhav v ...…
 
Intel and two other major chipmakers are rushing to patch security flaws that could potentially put virtually all modern computers in the world at risk. The vulnerabilities could allow a hacker to steal sensitive data stored on the computer's processing chip itself, although there is no known exploit yet. Also on the show; Japan's Nikkei surged ...…
 
BITCHFEST George Papadoupolos Felix Sater Timing of Comey letter Randy Bryce Ad THIS DOCTOR MAKES HOUSE CALLS Indivisible Oregon Calling Scripts MAIN ACTION OF THE WEEK: Finish up the work of 2017 The only thing the governing GOP managed to pass in 2017 was the Tax Bill which creates $1.5 trillion debt and favors corporate tax cuts over middle ...…
 
What you need to know about the Intel chip vulnerability, controlling a car with your mind and more startups try to make a go of lab-grown meat. With Tom Merritt, Sarah Lane, Roger Chang, Scott Johnson and Rich Stroffolino. MP3 Using a Screen Reader? Click here Multiple versions (ogg, video etc.) from Archive.org. Please SUBSCRIBE HERE. Follow ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
Type confusion, often combined with use-after-free, is the main attack vector to compromise modern C++ software like browsers or virtual machines. Typecasting is a core principle that enables modularity in C++. For performance, most typecasts are only checked statically, i.e., the check only tests if a cast is allowed for the given type hierarc ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
As authors it is our responsibility to build secure software and give each other the chance to verify and monitor our work.Various flaws in development toolchains that allow code execution just by viewing or working in malicious repositories question the integrity of development environments and as such our projects as a whole. This talk will d ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
Small gateways connect all kinds of fieldbusses to IP systems. This talk will look at the (in)security of those gateways, starting with simple vulnerabilities, and then deep diving into reverse-engineering the firmware and breaking the encryption of firmware upgrades. The found vulnerabilities will then be demonstrated live on a portable SCADA ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
Hacker culture overcomes limitations in computer systems through creativity and tinkering. At the same time, hacker culture has shaped the practice of software development to this day. This is problematic - techniques effective for breaking (into) a computer systems are not necessarily suitable for developing resilient and secure systems. It do ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often triv ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
For non specialists, Electromagnetic Pulse weapons (EMP) are fantasy weapons in science fiction movies. Interestingly, the susceptibility of electronic devices to electromagnetic interference has been advertised since the 90’s. Regarding the high integration of sensors and digital systems to control power-grids, telecom networks and automation ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry.We will present the first reverse-engineering and analysis of the exploit mitigations, secure random number gener ...…
 
A recent US spy satellite photo showing Chinese ships selling oil to North Korean ships in violation of UN Security Council resolutions is supposed to infuriate us. But sanctions are immoral, they hurt the most vulnerable, and the never work.
 
C
Chaos Computer Club - recent events feed (low quality)
 
In our paper we present a novel tool called BootStomp able to identify security vulnerabilities in Android bootloaders (such as memory corruptions) as well as unlocking vulnerabilities. During its evaluation, BootStomp discovered 6 previously unknown vulnerabilities across 4 different bootloaders. Finally BootStomp has been open-sourced to help ...…
 
The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire RSS: https://shannon ...…
 
With Ambassador Hank Cooper and Dr. Peter Vincent Pry AMB. HANK COOPER, Director of the Strategic Defensive Initiative Organization, (SDIO) during the Bush Administration, Chairman of Applied Research Associates, Senior Associate of the National Institute of Public Policy, Visiting Fellow at the Heritage Center: Assessment of President Trump’s ...…
 
With just a few days before Christmas, we discuss how to safely shop online in the holiday season and all year round. We also talk about a recent Apple firmware update for AirPort base stations, one that patches the KRACK exploit. Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users AirPort Base Station Firmware Update 7.7.9 Informat ...…
 
The Tesla Roadster 2 boasts impressive numbers. Jules gets a new Kindle. Apple has a terrible couple of weeks with vulnerabilities, bugs, and some awkward design choices in the past. Andrew heavily dislikes like the Aibo Robot Dog. Links: @mavispodcast on Twitter Tesla Roadster 2 - Car and Driver Accidental Tech Podcast: 249: Beehives Full of B ...…
 
S
Security Now (Video HD)
 
This week we examine how Estonia handled the Infineon crypto bug, two additional consequences of the pressure to maliciously mine cryptocurrency, 0-day exploits in the popular vBulletin forum system, Mozilla in the doghouse over Mr. Robot, Win10's insecure password manager mistake, when legacy protocol comes back to bite us, hole to bulk-steal ...…
 
Kathy explains her role as Director of Security at the startup, GitLab. She’s responsible for securing the company, which involves setting guidelines on how to store customer data and other sensitive data within the company infrastructure. She works with other teams in the organization to ensure that the product that is rolled out is as secure ...…
 
U
USA Talk Radio
 
Happy Friday! Since my last program NYC has once again been the target for a terror attack. This time a would-be suicide bomber, a lawful immigrant from Bangladesh attempted unsuccessfully to create a mass casualty disaster under the streets of Times Square in Manhattan. We will consider the vulnerabilities our dysfunctional immigration system ...…
 
B
Bring Your Own Device
 
We sidetrack into movie land due to The Last Jedi release, but quickly return to the tech track, with Apple breaking security on HomeKit and fixing it rather quickly. And diving into security and privacy in the current day and age. Also, Windows PC on SnapDragon chips, the iMac Pro, Jony Ive returns from this Architecture leave to design actual ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login