Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @OffTheHook@hackers.town
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Sergei and the Westminster Spy Ring - with Carole Cadwalladr and Peter Jukes
Duende Productions Ltd and FlameFlower Studios
As Brexit continues to damage and diminish the UK, and Putin backed Presidential Candidate Donald Trump threatens to return to the White House, Sergei Kristo reveals the Kremlin spy operation that goes back to 2011, and we follow the next decade of information warfare and kompromat with Orwell Prize-winning journalist Carole Cadwalladr and Byline co-founder Peter Jukes Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
1
Cybercrime Wire For Aug. 31 - Sept. 1, 2024. Weekend Update. WCYB Digital Radio.
1:20
1:20
Play later
Play later
Lists
Like
Liked
1:20
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Pop goes the developer. [Research Saturday]
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46
Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS syst…
…
continue reading
1
Mastering AI & Cybersecurity: Navigating the Future - A Special Panel Discussion
1:04:55
1:04:55
Play later
Play later
Lists
Like
Liked
1:04:55
Welcome to a special weekend edition of Cyber Security Today! In this long weekend episode, we delve into the world of artificial intelligence (AI) and its impact on various sectors, particularly as organizations ramp up their plans for the upcoming year. Join our host Jim Love and a distinguished panel of experts: Evgeny Koloda, Marcel Gagne, John…
…
continue reading
1
Pop goes the developer. [Research Saturday]
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46
Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS syst…
…
continue reading
1
AI The Creative Workflow & The Dangers of Groupthink
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38
A new study shows that while generative AI like ChatGPT makes individual stories more creative and engaging, it also makes them more similar to each other. | by Ben Dickson | MORE Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielm…
…
continue reading
1
Book | The Promise and Peril of CRISPR | Exploring the Intricate Relationship Between Healthcare, Technology, Ethics, and Society with Dr. Neal Baer | Redefining Society with Marco Ciappelli
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55
Guest: ✨ Dr. Neal Baer, Co-Director, Master's Degree Program in Media, Medicine, and Health, Harvard Medical School On LinkedIn | https://www.linkedin.com/in/neal-baer/ On Twitter | https://x.com/NealBaer On Facebook | https://www.facebook.com/neal.baer.75/ On Instagram | https://www.instagram.com/nealbaer/ ____________________________ Host: Marco …
…
continue reading
1
UL NO. 447: Sam Curry on Bug Bounty Careers, Slack Data Exfil, The Work Lie
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34
Stopping Chinese AI/Robot imports, Substrate for political platforms, sun vs. smoking, and more... Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See you in…
…
continue reading
1
Building AI BOMs - Helen Oakley - PSW #841
3:01:47
3:01:47
Play later
Play later
Lists
Like
Liked
3:01:47
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
…
continue reading
1
High stakes for high tech: California's AI safety regulations take center stage.
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02
AI regulations move forward in California. DDoS attacks are on the rise. CISA releases a joint Cybersecurity Advisory on the RansomHub ransomware. A persistent malware campaign has been targeting Roblox developers. Two European men are indicted for orchestrating a widespread “swatting” campaign. Critical vulnerabilities in an enterprise network mon…
…
continue reading
1
High stakes for high tech: California's AI safety regulations take center stage.
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02
AI regulations move forward in California. DDoS attacks are on the rise. CISA releases a joint Cybersecurity Advisory on the RansomHub ransomware. A persistent malware campaign has been targeting Roblox developers. Two European men are indicted for orchestrating a widespread “swatting” campaign. Critical vulnerabilities in an enterprise network mon…
…
continue reading
1
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland... - SWN #411
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-411
…
continue reading
1
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland... - SWN #411
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-411
…
continue reading
1
Ep10: Volt Typhoon zero-day, Russia's APT29 reusing spyware exploits, Pavel Durov's arrest
1:18:37
1:18:37
Play later
Play later
Lists
Like
Liked
1:18:37
Three Buddy Problem - Episode 10: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Window…
…
continue reading
1
Building AI BOMs - Helen Oakley - PSW #841
3:01:47
3:01:47
Play later
Play later
Lists
Like
Liked
3:01:47
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
Play later
Play later
Lists
Like
Liked
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
Play later
Play later
Lists
Like
Liked
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
Cybercrime Wire For Aug. 30, 2024. Connecticut Town Scammed Out of 200K+. WCYB Digital Radio.
1:25
1:25
Play later
Play later
Lists
Like
Liked
1:25
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
CTRL, ALT, HACKED. Mass Layoffs Hit Bungie. Over 200 Employees Let Go.
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34
According to Kotaku, Bungie laid off 220 employees, or approximately 17 percent of its workforce. The news, which comes on the heels of a successful expansion launch with Destiny 2: The Final Shape in June and another round of layoffs late last year, has prompted former employees and players alike to criticize Bungie’s leadership. In this episode, …
…
continue reading
1
Cybercrime News For Aug. 30, 2024. Fota Wildlife Park Hit by Cyberattack. WCYB Digital Radio.
3:05
3:05
Play later
Play later
Lists
Like
Liked
3:05
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Cybersecurity In Perspective. Why MDR & Why Now? James Turgal, Optiv.
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05
James Turgal is the Vice President, Cyber Risk, Strategy & Board Relations, at Optiv. In this episode, he joins host Heather Engel to discuss MDR, including why it's important in today's cyber landscape, especially why now compared to the past, and more. Cybersecurity In Perspective is a Cybercrime Magazine podcast series brought to you by Optiv. T…
…
continue reading
1
Zero Day Reuse and A Busy Week for Iranian APTs
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32
The focus was on Iranian APTs this week, both from private threat intelligence teams and CISA, exposing new operations from UNC757 and other groups targeting government, higher education, and private industry. We also check in on a new report from Google's Threat Analysis Group on APTs using the same exploits for zero days that were developed by pr…
…
continue reading
1
How To Report A Cybercrime In Louisiana or Anywhere in the U.S.
1:35
1:35
Play later
Play later
Lists
Like
Liked
1:35
For every citizen and business in the United States, cybercrime is a growing – and perhaps inescapable – threat. So, what do you do if you or someone you know falls victim to a cyberattack, data breach, or hack? The researchers at Cybercrime Magazine encourage you to file a complaint with the FBI’s Internet Crime Complaint Center and the appropriat…
…
continue reading
1
Resiliency Unleashed. Election Security. Jake Braun, University of Chicago & Kris Lovejoy, Kyndryl.
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06
Jake Braun is a Lecturer and Senior Advisor at the Harris School of Public Policy at the University of Chicago, and co-founder of the DEF CON Voting Machine Hacking Village. In this episode, he joins host Paul John Spaulding and Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl to discuss election and voter security, as well a…
…
continue reading
1
Uniting the World Through Music: An Exclusive Chat with Rick DellaRatta on Jazz for Peace, Featuring a Live Rendition of “Ruby, My Dear” by Thelonious Monk | Audio Signals Podcast With Marco Ciappelli ...
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35
Guest: Rick DellaRatta, Founder, Jazz For Peace On LinkedIn | https://www.linkedin.com/in/rick-dellaratta-08199818/ On Twitter | https://twitter.com/jazzmgmt On Mastodon | https://twitter.com/jazzmgmt On Facebook | https://www.facebook.com/JazzforPeaceGrant/ On TikTok | https://www.facebook.com/JazzforPeaceGrant/ On Instagram | https://www.instagra…
…
continue reading
On this week’s show: - A phishing test that seems to have gone too far… - Spying and hacking in unsuspecting ways… - And maybe it’s time to call in the philosophers… Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.comBy SecureMac
…
continue reading
1
161. Mic Drop: Can ransomware be an act of terror?
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01
New legislation is seeking to designate some ransomware attacks as acts of terror. Former FBI agent John Riggi talks about the proposal and how it might change the battle against ransomware gangs.By Recorded Future News
…
continue reading
1
DICK’S Sporting Goods cyberattack, Brain Cipher hacked Paris
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13
DICK’S Sporting Goods suffers cyberattack Brain Cipher claims attack on Paris museums, promises data leak Play ransomware hackers claim attack on Microchip Technology Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class …
…
continue reading
1
161. Mic Drop: Can ransomware be an act of terror?
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01
New legislation is seeking to designate some ransomware attacks as acts of terror. Former FBI agent John Riggi talks about the proposal and how it might change the battle against ransomware gangs.By Recorded Future News
…
continue reading
1
Deepfake Scams, Fake Global Protect Malware, and Russian Threats:Cybersecurity Today: for Friday, August 30th, 2024
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58
In this episode of Cybersecurity Today, host Jim Love dives into the alarming rise of deepfake scams, highlighting how threat actors are using AI-generated videos to lure victims into fraudulent schemes. A notable campaign involves deepfake videos of Elon Musk promoting 'Quantum AI.' Additionally, the episode covers a sophisticated cyber attack whe…
…
continue reading
1
ISC StormCast for Friday, August 30th, 2024
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01
Live Patching DLLs with Python https://isc.sans.edu/diary/Live%20Patching%20DLLs%20with%20Python/31218 Global Protect Phishing https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html BlackByte Ransomware Update https://blog.talosintelligence.com/blackbyte-blends-tried-and-true-tradecraft-with-newly-discl…
…
continue reading
The August episode is a review of projects from a recent OWASP project showcase. We talk to the leaders of the OWASP pytm, OWASP Developer Guide, OWASP State of AppSec Survey Project. Get up on the latest news and update on these OWASP projects.OWASP pytm:- https://owasp.org/www-project-pytm/- https://github.com/izar/pytmOWASP Develper Guide:- http…
…
continue reading
French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getti…
…
continue reading
French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getti…
…
continue reading
In this episode Michael, Sarah, Gladys and Mark talk about our careers so far, explain some funny stories and our wishes for a more secure future. Our stories Mark at the start Sarah 4m 5s Gladys 6m 50s Michael 12m 22s Funny Stories Mark 19m 31s Sarah 20m 33s Gladys 22m 46s Michael 24m 39s Career Advice Mark 26m 58s Sarah 29m 18s Gladys 31m 48s Mic…
…
continue reading
1
Incident Materiality and Meeting New SEC Requirements with Malcolm Harkins | Cybersecurity Insights Podcast with Matthew Rosenquist
33:57
33:57
Play later
Play later
Lists
Like
Liked
33:57
Guest: Malcolm Harkins, Chief Security and Trust officer at HiddenLayer, former CISO at Intel, and fellow at the Institute for Critical Infrastructure Technology (ICIT) On LinkedIn | https://www.linkedin.com/in/malcolmharkins/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist…
…
continue reading
1
Telegram CEO Arrested, Volt Typhoon, Cybercriminal Forum Insights
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
In this episode of ShadowTalk, host Chris and Kim, along with Director of Threat Research Brandon Tirado and Threat Intelligence Analyst Anna, discuss the latest news in cyber security and threat research. Telegram CEO arrested in France over alleged criminal use of the platform Return of Volt Typhoon: China APT exploiting Versa high-severity bug C…
…
continue reading
1
Data Security. CrowdStrike Outage Explained. Scott Schober, Author, "Hacked Again."
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the July 2024 CrowdStrike outage, explain what happened, and more. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, a…
…
continue reading
00:00 - PreShow Banter™ — Move to Signal 03:47 - BHIS - Talkin’ Bout [infosec] News 2024-08-26 04:37 - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance 11:03 - Story # 1b: Moxie on X.com 23:17 - Story # 2: Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules 29:39 - Story # 3: Seattle airport ‘possible cyberattac…
…
continue reading
00:00 - PreShow Banter™ — Move to Signal 03:47 - BHIS - Talkin’ Bout [infosec] News 2024-08-26 04:37 - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance 11:03 - Story # 1b: Moxie on X.com 23:17 - Story # 2: Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules 29:39 - Story # 3: Seattle airport ‘possible cyberattac…
…
continue reading
1
Cybercrime Wire For Aug. 29, 2024. Cyberattack Strikes Dick's Sporting Goods. WCYB Digital Radio.
1:20
1:20
Play later
Play later
Lists
Like
Liked
1:20
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
DEF CON 32. Highlights From The 2024 Hacking Conference. Sherrod DeGrippo, Top Cybersecurity Expert.
2:31
2:31
Play later
Play later
Lists
Like
Liked
2:31
DEF CON is the world’s longest-running and largest underground hacking conference. This year’s event took place from August 8th to 11th in Las Vegas, Nevada. Cybercrime Magazine was in attendance with top cybersecurity expert and director of threat intelligence strategy at Microsoft, Sherrod DeGrippo. Tune in to hear some of the top highlights from…
…
continue reading
1
Cybercrime News For Aug. 29, 2024. Chinese Hackers Breach U.S. Internet Firms. WCYB Digital Radio.
2:59
2:59
Play later
Play later
Lists
Like
Liked
2:59
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Cybercrime Magazine Update: 25 Fastest Growing Cybersecurity Companies. Ranked By Insider Monkey.
4:05
4:05
Play later
Play later
Lists
Like
Liked
4:05
Insider Monkey ranked the 25 fastest-growing companies who are fighting cybercrime. SentinelOne tops the list for being the fastest-growing cybersecurity company in the world. Zscaler came in at number two on the list, followed by Crowdstrike. Rounding out the top five are Cloudflare and Blackberry. In this episode, host Paul John Spaulding is join…
…
continue reading
1
Ask Me Anything, Theresa Payton. Building An Investigation. Sponsored By Pipl.
3:33
3:33
Play later
Play later
Lists
Like
Liked
3:33
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
…
continue reading
Episode 361 of the Transatlantic Cable podcast kicks off with news around the right to switch off in Australia. From there the team talk about privacy – specifically if you should have to pay to have online privacy. To wrap up, the team discuss how and why a popular game has attracted so much online attention. If you liked what you heard, please co…
…
continue reading
1
Steve Springett -- Software and System Transparency
48:13
48:13
Play later
Play later
Lists
Like
Liked
48:13
In this episode of the Application Security Podcast, hosts Chris Romeo and Robert Hurlbut welcome back Steve Springett, an expert in secure software development and a key figure in several OWASP projects. Steve unpacks CycloneDX and the value proposition of various BOMs. He gives us a rundown of the BOM landscape and unveils some new BOM projects t…
…
continue reading
1
Episode 258: Broken Brokers – Optery’s Fight To Claw Back Your Personal Data
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16
Lawrence Gentilello, the co-founder and CEO of Optery talks about the growing scandal around breaches at data brokers that have exposed the sensitive data on hundreds of millions of Americans to cyber criminals and how firms like Optery are helping people fight back. The post Episode 258: Broken Brokers – Optery’s Fight To Claw Back Your Personal D…
…
continue reading
1
What's Working With Third-Party Risk Management?
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Nick Muy, CISO, Scrut Automation. In this episode: Segment …
…
continue reading
1
Iran hacking, Labour Party backlog, more Telegram warrants
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Iran targeting presidential administration officials Iran working with ransomware gangs UK Labour Party chided over cyberattack backlog Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process automatio…
…
continue reading
1
Don’t Judge Yourself Based On What Companies Think of Your Skills
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32
I watched a number of videos last night about people losing their jobs, starting a YouTube channel, and just generally struggling. People are hurting because they’re feeling the ground shifting under their feet and it’s not clear if it’s their fault, what’s going on, or what to do about it. Subscribe to the newsletter at: https://danielmiessler.com…
…
continue reading