Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Daily update on current cyber security threats
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
Deception, influence, and social engineering in the world of cyber crime.
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. Each issue is filled with interesting commentary, pointed critique, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. This is the audio version of the Crypto-Gram Newsletter, and is read by Dan Henage.
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @HackerRadioShow@Mastodon.social
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
Thinking about the intersection of security, technology, and society—and what might be coming next. A curated 15-30 minute summary of the week's most important stories and ideas every Monday, and periodic essays and guest appearances that explore a single topic.
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
The "People | Process | Technology" podcast is a recorded series of discussions with thought leaders and practitioners who are working on integrating the three areas of business that are most likely to have a massive impact on your business.
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
D
Dial M for Mueller: Why Brexit Needs an FBI Style Inquiry - with Carole Cadwalladr and Peter Jukes


1
Dial M for Mueller: Why Brexit Needs an FBI Style Inquiry - with Carole Cadwalladr and Peter Jukes
From the team behind the No 1 Hit podcast, Untold: the Daniel Morgan Murder, comes another inside story of a crime - in this case the hacking, data misuse, illegal financing and potential interference in the EU referendum. Orwell Prize winning journalist Carole Cadwalladr lays out the evidence with Peter Jukes and asks: why hasn't the UK got a proper investigation into wrongdoing
Computer security from the ground up.
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Information Security is the name of the game. Don't let the hackers win!
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
This week we sit down with Charlene Mowery, Director of Strategic Initiatives at Red Hat who shares insights and lessons learned on leadership and moving forward seemingly impossible and incredibly complex multi-stakeholder initiatives to success, such as the Ford Island Master Development Agreement. She also dives into the impact of DevSecOps in r…
i
inThirty


1
Security 264 – Facebook and Ubiquiti Leaks
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18
We talk about two significant user leaks that happened recently. Facebook: https://krebsonsecurity.com/2021/04/are-you-one-of-the-533m-people-who-got-facebooked/ Ubiquiti: https://krebsonsecurity.com/2021/04/ubiquiti-all-but-confirms-breach-response-iniquity/By Security
C
CISO-Security Vendor Relationship Podcast


1
What to Expect When You’re Expecting a Network Breach
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23
All links and images for this episode can be found on CISO Series https://cisoseries.com/what-to-expect-when-youre-expecting-a-network-breach/ Are you expecting a little intrusion into your network any day now? You better be prepared. Are there some vulnerabilities you should have managed, but didn't? Don't worry, first time security professionals …
C
Cyber Risk Management Podcast


1
Busted: The Truth about Cloud Security
1:02:40
1:02:40
Play later
Play later
Lists
Like
Liked
1:02:40
What do you know about Cloud Security Marketing?! In today’s episode, we do some mythbusting, specifically targeting common cloud security marketing messages, with the help of our guest, Paul Rich. To see more about Paul Rich check out his LinkedIn Profile: https://www.linkedin.com/in/parich/By Kip Boyle
T
The National Security Podcast


1
Senator James Paterson on Australian security and foreign interference
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34
In this episode of the National Security Podcast — part of our Security Summit Series — Chair of the Parliamentary Joint Committee on Intelligence and Security Senator James Paterson chats to Head of the ANU National Security College Professor Rory Medcalf. The Parliamentary Joint Committee on Intelligence and Security (PJCIS) has become increasing…
Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing jobs she’s done. Sponsors Support for this show comes from Blinkist. They offer thousands of condensed non…
Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing jobs she’s done. Sponsors Support for this show comes from Blinkist. They offer thousands of condensed non…
More than 74k people every month apply for government jobs in the intel sector. 98% of them are rejected. But at the same time, a much smaller group is breaking into private intelligence, making more money, and doing the same impactful work. In this episode, Andrew breaks down what private intelligence is (and isn't) and explains the surprising con…
Nvidia announces AI-powered tools for cybersecurity Biden announces nominations for cybersecurity positions Apple updates chip security mid-production Thanks to our episode sponsor, Sonatype Ask any software developer, and they’ll tell you the truth about two things: 1. Conventional code analysis and appsec tools are noisy and not well integrated i…
On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.By CyberWire Inc.
B
Brakeing Down Security Podcast


1
2021-014-Slipstreaming blocked by Chrome, Slack being used for malware, plus dork and deskjockeys!
51:59
51:59
Play later
Play later
Lists
Like
Liked
51:59
Chrome Blocks Port 10080 to Prevent Slipstreaming Hacks - E Hacking News - Latest Hacker News and IT Security News https://www.reddit.com/r/netsec/comments/jlu3cf/nat_slipstreaming/ Samy Kamkar - NAT Slipstreaming v2.0 Slack and Discord are Being Hijacked by Hackers to Distribute Malware - E Hacking News - Latest Hacker News and IT Security News Te…
B
Brakeing Down Security Podcast


1
2021-014-Slipstreaming blocked by Chrome, Slack being used for malware, plus dork and deskjockeys!
51:59
51:59
Play later
Play later
Lists
Like
Liked
51:59
Chrome Blocks Port 10080 to Prevent Slipstreaming Hacks - E Hacking News - Latest Hacker News and IT Security News https://www.reddit.com/r/netsec/comments/jlu3cf/nat_slipstreaming/ Samy Kamkar - NAT Slipstreaming v2.0 Slack and Discord are Being Hijacked by Hackers to Distribute Malware - E Hacking News - Latest Hacker News and IT Security News Te…
B
Brakeing Down Security Podcast


1
2021-014-Slipstreaming blocked by Chrome, Slack being used for malware, plus dork and deskjockeys!
51:59
51:59
Play later
Play later
Lists
Like
Liked
51:59
Chrome Blocks Port 10080 to Prevent Slipstreaming Hacks - E Hacking News - Latest Hacker News and IT Security News https://www.reddit.com/r/netsec/comments/jlu3cf/nat_slipstreaming/ Samy Kamkar - NAT Slipstreaming v2.0 Slack and Discord are Being Hijacked by Hackers to Distribute Malware - E Hacking News - Latest Hacker News and IT Security News Te…
B
Brakeing Down Security Podcast


1
2021-014-Slipstreaming blocked by Chrome, Slack being used for malware, plus dork and deskjockeys!
51:59
51:59
Play later
Play later
Lists
Like
Liked
51:59
Chrome Blocks Port 10080 to Prevent Slipstreaming Hacks - E Hacking News - Latest Hacker News and IT Security News https://www.reddit.com/r/netsec/comments/jlu3cf/nat_slipstreaming/ Samy Kamkar - NAT Slipstreaming v2.0 Slack and Discord are Being Hijacked by Hackers to Distribute Malware - E Hacking News - Latest Hacker News and IT Security News Te…
Example of Cleartext Cobalt Strike Traffic https://isc.sans.edu/forums/diary/Example+of+Cleartext+Cobalt+Strike+Traffic+Thanks+Brad/27300/ ASA 5506 Series Security Appliances Field Notice https://www.cisco.com/c/en/us/support/docs/field-notices/720/fn72019.html Expired Certificate for PulseSecure VPN Devices https://kb.pulsesecure.net/articles/Puls…
Example of Cleartext Cobalt Strike Traffic https://isc.sans.edu/forums/diary/Example+of+Cleartext+Cobalt+Strike+Traffic+Thanks+Brad/27300/ ASA 5506 Series Security Appliances Field Notice https://www.cisco.com/c/en/us/support/docs/field-notices/720/fn72019.html Expired Certificate for PulseSecure VPN Devices https://kb.pulsesecure.net/articles/Puls…
I
ITSPmagazine Podcast


1
Log's Honest Truth — Confessions Of An InfoSec Engineer | A Confession From Mr B | A Devo Story With Julian Waits
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49
When businesses rely on their own infrastructure to protect their customers' products and services, security analysts are left with very little room for error and no time to waste. Long waiting times on database search results is most certainly not a good thing. Many might be skeptical that the latest and greatest methods and technologies can meet …
T
The CyberWire Daily


1
Apparent cyber sabotage at Natanz. Arrest made in alleged plot to blow up AWS facility. Scraped data for sale in criminal fora. US senior cyber appointments expected soon.
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44
Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos…
T
The CyberWire Daily


1
Apparent cyber sabotage at Natanz. Arrest made in alleged plot to blow up AWS facility. Scraped data for sale in criminal fora. US senior cyber appointments expected soon.
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44
Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos…
R
Recorded Future - Inside Security Intelligence


1
204 The Inner Workings of Financially Motivated Cybercrime
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08
Recorded Future’s Insikt Group recently published a research report titled, The Business of Fraud: An Overview of How Cybercrime Gets Monetized. The report describes the types of fraud methods and services currently used by threat actors to facilitate their campaigns. It provides an overview of some notable recent developments, lists some of the to…
R
Recorded Future - Inside Security Intelligence


1
204 The Inner Workings of Financially Motivated Cybercrime
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08
Recorded Future’s Insikt Group recently published a research report titled, The Business of Fraud: An Overview of How Cybercrime Gets Monetized. The report describes the types of fraud methods and services currently used by threat actors to facilitate their campaigns. It provides an overview of some notable recent developments, lists some of the to…
S
Security Voices


1
Melanie Ensign Doesn’t like Clubhouse, Press Releases & FUDー & Neither Should You
1:08:16
1:08:16
Play later
Play later
Lists
Like
Liked
1:08:16
Communications professionals are often quiet coaches. They work their magic behind the scenes. They hold their opinions tightly and express them infrequently. In short, their influence is everywhere but their fingerprints are often invisible. Melanie Ensign is having none of that. And we’re all the better for it. In this 64 minute interview, you’ll…
S
Security In Five Podcast


1
Episode 953 - 500 Million Records From LinkedIn Leaked, But It Was Not A Breach
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32
This week another social media platform had a large amount of user data offered online. LinkedIn had 500 million users' information put up for sale. However, this data was not gathered through a breach but through scraping. This episode talks about the difference. Be aware, be safe. Check your email: https://cybernews.com/personal-data-leak-check/ …
By FireEye Inc,
Lots of news to cover today… and to me the common thread seems to be a lack of proper security and privacy. So the theme today is “trust no one”. And the idea there isn’t really personal trust, but computer trust, algorithm trust, procedural trust. We need to engineer our systems and processes around the idea that data is a toxic asset that loves t…
W
WIRED Security: News, Advice, and More


1
How to Keep Nearby Strangers from Sending You Files
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45
Sharing is caring—except when it's an unwelcome photo from a rando on the subway. Here's how to lock down your phone and computer.
C
Cyber Security Today


1
Cyber Security Today, April 12, 2021 - Phone scams, job scams and contact page scams.
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01
Today's podcast reports on credit card phone scams, a con that takes advantage of corporate 'contact us' web pages and the latest job posting tricksBy ITWC
M
Malicious Life


1
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17
Chris Wysopal (aka WeldPond), a cyber security pioneer and one of L0pht’s founding members, talks about the group’s 1998 testimony in the Senate, how they used shaming to force corporations to fix their software, and the (not so fortunate) consequences of the sale to @stake. The post Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Sid…
M
Malicious Life


1
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17
Chris Wysopal (aka WeldPond), a cyber security pioneer and one of L0pht’s founding members, talks about the group’s 1998 testimony in the Senate, how they used shaming to force corporations to fix their software, and the (not so fortunate) consequences of the sale to @stake. The post Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Sid…
M
Malicious Life


1
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17
Chris Wysopal (aka WeldPond), a cyber security pioneer and one of L0pht’s founding members, talks about the group’s 1998 testimony in the Senate, how they used shaming to force corporations to fix their software, and the (not so fortunate) consequences of the sale to @stake. The post Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Sid…
Israel carries out cyberattack on Iran nuclear facility Joker malware infects over 500,000 Huawei Android devices Critical cloud bug in VMWare Carbon Black allows takeover Thanks to our episode sponsor, Sonatype With security concerns around software supply chains ushered to center stage in recent months, organizations around the world are turning …
C
Cyber Work


1
What does a digital forensic investigator do in the government? | Cyber Work Podcast
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23
Digital forensics professional Ondrej Krehel talks about the work of digital forensics in federal and government locations, the things he learned during a months-long attempt at decrypting a well-secured Swiss bank file and why finishing the research beats any degree you could ever have. 0:00 - Intro 2:11 - Ondrej's cybersecurity journal 5:33 - Car…
Time to do a security test of Active Directory. Going to be using Bloodhound, Plumhound, mimikats and Ping Kastle. Never used them before. First time for everything. LINKS 1. Bloodhound 2. Plumhound 3. Mimikatz 4. PingCastle 5. BadBlood FIND US ON 1. Facebook 2. Twitter - DamienHullBy SECTION 9
T
The Shared Security Show


1
Best of Episode: Interview with Jayson E. Street
51:07
51:07
Play later
Play later
Lists
Like
Liked
51:07
This week is another best of episode with the man, the myth, the legend, Jayson E. Street! In this episode Jayson shares with us several of his greatest hacking and social engineering adventures. This is one classic episode you don’t want to miss! ** Links mentioned on the show ** Follow Jayson on Twitter https://twitter.com/jaysonstreet Check out …
T
The Shared Security Show


1
Best of Episode: Interview with Jayson E. Street
51:07
51:07
Play later
Play later
Lists
Like
Liked
51:07
This week is another best of episode with the man, the myth, the legend, Jayson E. Street! In this episode Jayson shares with us several of his greatest hacking and social engineering adventures. This is one classic episode you don’t want to miss! ** Links mentioned on the show ** Follow Jayson on Twitter https://twitter.com/jaysonstreet Check out …
Show #163 4.11.2021 Dark Patterns. Latest News. Live from Florida This is show 163By Hackers
No Python Interpreter? This Simple RAT Installs Its Own Copy https://isc.sans.edu/forums/diary/No+Python+Interpreter+This+Simple+RAT+Installs+Its+Own+Copy/27292/ Facebook Mistakingly Suggests Adding Domains To Public Suffix List will Ease Tracking https://publicsuffix.org https://www.facebook.com/business/help/331612538028890?id=428636648170202 Fac…
No Python Interpreter? This Simple RAT Installs Its Own Copy https://isc.sans.edu/forums/diary/No+Python+Interpreter+This+Simple+RAT+Installs+Its+Own+Copy/27292/ Facebook Mistakingly Suggests Adding Domains To Public Suffix List will Ease Tracking https://publicsuffix.org https://www.facebook.com/business/help/331612538028890?id=428636648170202 Fac…
The power to destroy a thing is the absolute control over it. In this episode we examine dozens of films...By Tom Secker
G
GDPR Weekly Show


1
GDPR Weekly Show Episode 139 :- Vaccine Passports, EU Adequacy, Facebook, LinkedIn, NHS Scotland, US Universities, Employee DSAR, Dubai, CCPA and GDPR anonymised data
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41
Coming up in this week's episode: Update on Covid-19 Vaccine Passports, EU/UK Data Adequacy Decision - is the EU dragging its heels on ratification? Facebook data breach update, LinkedIn data breach exposes details of 500 million members, NHS Scotland freedom of information request shows the scale of data breaches, US Universities affected by Accce…
T
The CyberWire Daily


1
Debra Danielson: Be fearless. [CTO] [Career Notes]
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10
Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debr…
T
The CyberWire Daily


1
Debra Danielson: Be fearless. [CTO] [Career Notes]
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10
Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debr…
I
ITSPmagazine Podcast


1
How I Got Started In CTI | A Conversation With JR | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44
During this episode, we meet with the brilliant and extremely humble JR who has over 15 years of experience in the cyber space. She talks about her unique experience going from medical work to now be working in the cyber threat space where she now works with Cyber Crime, Human Intel and so much more. Anyone considering getting into the cyber threat…
S
Security In Five Podcast


1
Episode 952 - Tools, Tips and Tricks - HaveIBeenPwned Phone Numbers
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02
This week's tools, tips, and tricks talk about a new feature on HaveIBeenPwned.com. You can now search for your phone number. This episode talks about why this was added and why you should go search right now to see if you are a victim. Source - https://haveibeenpwned.com/ Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast wit…
T
The CyberWire Daily


1
Strategic titles point to something more than a commodity campaign. [Research Saturday]
23:56
23:56
Play later
Play later
Lists
Like
Liked
23:56
Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, …
T
The CyberWire Daily


1
Strategic titles point to something more than a commodity campaign. [Research Saturday]
23:56
23:56
Play later
Play later
Lists
Like
Liked
23:56
Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, …
UK Anonymity Petition; Coinhive Feedback; The Facebook Breach / Scrape; My Book With Rob Conery; Ukrainian Gov on HIBP; Sponsored by safepass.me https://www.troyhunt.com/weekly-update-238/ See omnystudio.com/listener for privacy information.By Troy Hunt
C
Cyber Security Weekly Podcast


We speak with Anna Leibel and Claire Pales on their new book - The Secure Board. This latest book is the second book from best selling author, Claire Pales and the first for her co-author Anna Leibel. Claire and Anna are the founders of the boutique advisory firm The Secure Board and leading experts in cyber security and technology. They are indepe…
P
Paul's Security Weekly (Podcast-Only)


1
The Hunt for Red October - PSW #690
3:18:41
3:18:41
Play later
Play later
Lists
Like
Liked
3:18:41
This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after r…