Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @OffTheHook@hackers.town
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
1
Dial M for Mueller: Why Brexit Needs an FBI Style Inquiry - with Carole Cadwalladr and Peter Jukes
Duende Productions Ltd and FlameFlower Studios
From the team behind the No 1 Hit podcast, Untold: the Daniel Morgan Murder, comes another inside story of a crime - in this case the hacking, data misuse, illegal financing and potential interference in the EU referendum. Orwell Prize winning journalist Carole Cadwalladr lays out the evidence with Peter Jukes and asks: why hasn't the UK got a proper investigation into wrongdoing Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
This week, Audra is joined by Mark Montgomery, senior director of the FDD’s Center on Cyber and Technology Innovation and director of the CSC 2.0. Today’s discussion focuses on the progress made implementing the recommendations of the Cyberspace Solarium Commission’s 2020 report and securing critical infrastructure more broadly, including insights …
…
continue reading
1
Talking Cyber. Albedo Satellite Sparks Privacy Concerns. Heather Engel, Strategic Cyber Partners.
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27
Talking Cyber is a Cybercrime Magazine podcast series that covers the latest news and breaking stories on the cybereconomy, hackers, intrusions, privacy, security and much more. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss a new type of satellite equipped with cameras tha…
…
continue reading
1
Sinking US Wiretap Program Offered One Last Lifeboat
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
For months, US lawmakers have examined every side of a historic surveillance debate. With the introduction of the SAFE Act, all that's left to do now is vote. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
1
BREAKING: “Department of No” Upgraded to “Department of Slow”
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Nadav Lotan, product management team leader, Cisco. In this episode: How can security teams do their jobs without seeming like an im…
…
continue reading
1
Social Speech and the Supreme Court
1:00:16
1:00:16
Play later
Play later
Lists
Like
Liked
1:00:16
The Supreme Court is getting a heavy serving of first amendment social media cases. Gus Hurwitz covers two that made the news last week. In the first, Justice Barrett spoke for a unanimous court in spelling out the very factbound rules that determine when a public official may use a platform’s tools to suppress critics posting on his or her social …
…
continue reading
1
Social Speech and the Supreme Court
1:00:16
1:00:16
Play later
Play later
Lists
Like
Liked
1:00:16
The Supreme Court is getting a heavy serving of first amendment social media cases. Gus Hurwitz covers two that made the news last week. In the first, Justice Barrett spoke for a unanimous court in spelling out the very factbound rules that determine when a public official may use a platform’s tools to suppress critics posting on his or her social …
…
continue reading
1
114. Exclusive: LockBit ransomware leader says, ‘I felt like I was being hunted’ but they ‘can’t stop me’
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47
We speak with the leader of one of the most prolific ransomware-as-a-service gangs the world has ever known — LockBit. Just weeks after Operation Cronos, a global police action against the group, LockBitSupp tells us about the takedown, his attempt to rebuild, and his plans for the future.By Recorded Future News
…
continue reading
1
Encore: cyber threat intelligence (CTI) (noun) [Word Notes]
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02
Information used by leadership to make decisions regarding the cybersecurity posture of their organization. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37
CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she t…
…
continue reading
1
Change Healthcare payout, FTC probe into Reddit, Japanese tech giant breached
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49
UnitedHealth fronts over $2 billion in recovery efforts Spyware agreement gains more international support FTC probes Reddit's AI data licensing ahead of IPO Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and securi…
…
continue reading
1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37
CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she t…
…
continue reading
1
114. Exclusive: LockBit ransomware leader says, ‘I felt like I was being hunted’ but they ‘can’t stop me’
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47
We speak with the leader of one of the most prolific ransomware-as-a-service gangs the world has ever known — LockBit. Just weeks after Operation Cronos, a global police action against the group, LockBitSupp tells us about the takedown, his attempt to rebuild, and his plans for the future.By Recorded Future News
…
continue reading
1
DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07
Today I'm talking Windows forensics, focusing on Windows event logs. These logs are very valuable for fast triage, often readily available in your organization's SIEM. But have you ever wondered about the processes enabling this quick access? Not only are the logs automatically collected and fed into the appliance, but they are also formatted and n…
…
continue reading
Brian Donohue of Red Canary joins Dennis Fisher to talk about some of the surprising findings from the company's new 2024 Threat Detection Report, including why identity based attacks continue to work so well and how attackers are approaching the shift to the cloud.By Decipher
…
continue reading
Microsoft announced deprecation of 1024 bit RSA Keys https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features#deprecated-features Chrome Real-Time Safe Browsing Protection https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/ Fortra FileCatalyst Vulnerability CVE-2024-25153 https://www.fortra.com/security/advisor…
…
continue reading
Microsoft announced deprecation of 1024 bit RSA Keys https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features#deprecated-features Chrome Real-Time Safe Browsing Protection https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/ Fortra FileCatalyst Vulnerability CVE-2024-25153 https://www.fortra.com/security/advisor…
…
continue reading
1
How Do We Handle Sneaky Changes in Terms and Conditions That Allow Training of AI with Sensitive/Customer Data Essentially Without Our Knowledge | A Conversation with Nigel Cannings| Redefining CyberSecurity ...
43:33
43:33
Play later
Play later
Lists
Like
Liked
43:33
Guest: Nigel Cannings, CEO at Intelligent Voice [@intelligentvox] On Linkedin | https://www.linkedin.com/in/nigelcannings/?originalSubdomain=uk Google Scholar | https://scholar.google.co.uk/citations?user=zHL1sngAAAAJ&hl=en ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurit…
…
continue reading
Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district gr…
…
continue reading
Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district gr…
…
continue reading
1
How The Evolving Threat Landscape Drives Innovation In Cybersecurity - Tom Parker, Dave Dewalt - BSW #342
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23
Dave DeWalt needs no introduction. A four-time CEO and currently the Founder and CEO of NightDragon, Dave collects, analyses, and disseminates more intelligence on the cybersecurity industry in a year than most of us ever will in a lifetime. We've invited Dave to Business Security Weekly to share some of that intelligence with our audience. Specifi…
…
continue reading
1
How The Evolving Threat Landscape Drives Innovation In Cybersecurity - Tom Parker, Dave Dewalt - BSW #342
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23
Dave DeWalt needs no introduction. A four-time CEO and currently the Founder and CEO of NightDragon, Dave collects, analyses, and disseminates more intelligence on the cybersecurity industry in a year than most of us ever will in a lifetime. We've invited Dave to Business Security Weekly to share some of that intelligence with our audience. Specifi…
…
continue reading
1
Kivucast. Cyberattack Preparation & Response For Businesses. Daniel Saunders, Kivu.
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54
Daniel Saunders is the Director, Incident Response, EMEA at Kivu. In this episode, he joins host Paul John Spaulding to discuss how businesses can prepare for and respond to a cyberattack, including insights from the recent incident at Change Healthcare. Kivucast is sponsored by Kivu, which offers strategic guidance and fully managed cybersecurity …
…
continue reading
1
Cybercrime Magazine Update: Security Codes Exposed. Facebook, Google, & TikTok Users Affected.
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37
According to TechCrunch, YX International, a technology company that routes millions of SMS text messages across the world has secured an exposed database that was spilling one-time security codes that may have granted users’ access to their Facebook, Google and TikTok accounts. In this episode, host Paul John Spaulding is joined by Steve Morgan, F…
…
continue reading
1
Cybercrime Wire For Mar. 18, 2024. Japanese Tech Giant Fujitsu Hit With Malware. WCYB Digital Radio.
1:21
1:21
Play later
Play later
Lists
Like
Liked
1:21
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Mar. 18, 2024. NFPrompt Reports Losses to Cyberattack. WCYB Digital Radio.
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
The 4 Big Questions the Pentagon's New UFO Report Fails to Answer
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24
The Pentagon says it’s not hiding aliens, but it stops notably short of saying what it is hiding. Here are the key questions that remain unanswered—some answers could be weirder than UFOs. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
Apocalypse Now and Francis Ford Coppola were rejected by the Pentagon when they asked for production support. A decade later... The post ClandesTime 263 – Gardens of Stone first appeared on Spy Culture. (Read more...)By Tom Secker
…
continue reading
The United States has no general data privacy laws. However, we do have some sector-specific regulations, including HIPAA for health data. But there are many misconceptions about HIPAA. For example, the “P” in HIPAA does not stand for Privacy – it stands for Portability. So, what information does HIPAA cover? Which healthcare and related service pr…
…
continue reading
1
Cyber Security Today, March 18, 2024 - Fix this Python vulnerability, patch these industrial control system products, the latest data breaches and more
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
This episode reports on bugs, holes, data breaches, a coming cybersecurity trust mark for US wireless consumer products and moreBy ITWC
…
continue reading
1
McDonald’s outage update, Chrome URL protection, Birmingham Alabama outage
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
Global McDonald’s outage blamed on third-party vendor, not cyberattack Google adds real-Time URL protection for Chrome Network outages hit Birmingham Alabama Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and securi…
…
continue reading
Overview We cover recent Linux malware from the Magnet Goblin threat actor, plus the newsof Ubuntu 23.10 as a target in Pwn2Own Vancouver 2024 and we detailvulnerabilities in Puma, AccountsService, Open vSwitch, OVN, and more. This week in Ubuntu Security Updates 102 unique CVEs addressed [USN-6679-1] FRR vulnerability (01:11) 1 CVEs addressed in J…
…
continue reading
1
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
24:53
24:53
Play later
Play later
Lists
Like
Liked
24:53
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by the House, which could force ByteDance to sell TikTok or face a ban in app stores. The episode also covers a significant update to Signal, all…
…
continue reading
1
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
24:53
24:53
Play later
Play later
Lists
Like
Liked
24:53
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by the House, which could force ByteDance to sell TikTok or face a ban in app stores. The episode also covers a significant update to Signal, all…
…
continue reading
5GHoul Revisted: Thress Months Later https://isc.sans.edu/diary/5Ghoul%20Revisited%3A%20Three%20Months%20Later/30746 Obfuscated Hexadecimal Payload https://isc.sans.edu/diary/Obfuscated%20Hexadecimal%20Payload/30750 ChatGPT Related OAUTH Issues https://salt.security/blog/security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-p…
…
continue reading
5GHoul Revisted: Thress Months Later https://isc.sans.edu/diary/5Ghoul%20Revisited%3A%20Three%20Months%20Later/30746 Obfuscated Hexadecimal Payload https://isc.sans.edu/diary/Obfuscated%20Hexadecimal%20Payload/30750 ChatGPT Related OAUTH Issues https://salt.security/blog/security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-p…
…
continue reading
We speak with Grant Wright, General Manager of Marketplace and AI Products, SEEK. Grant leads SEEK's global AI and Analytics teams at SEEK, who build and support the AI services that power SEEK's products including search, recommendations, candidate quality and pricing; and provide internal analytics and experimentation capability to better underst…
…
continue reading
1
An appointment with the Doctor to discuss culture, behaviour and decision making.
44:57
44:57
Play later
Play later
Lists
Like
Liked
44:57
If you’re a regular listener then you will have already met today’s guest Dr. Char Sample. Char is a force at work deep within the information security community. Char is a rarity, combining a deep knowledge of both the technical and human aspects of the challenges security professionals face when managing cyber security risks. Char and I go back a…
…
continue reading
1
Unveiling the updated NICE Framework & cybersecurity education’s future. [Special Edition]
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop th…
…
continue reading
1
Encore: Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02
Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working wi…
…
continue reading
1
Unveiling the updated NICE Framework & cybersecurity education’s future. [Special Edition]
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop th…
…
continue reading
1
Encore: Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02
Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working wi…
…
continue reading
1
Book | Sigh, See, Start: How to Be the Parent Your Child Needs in a World That Won’t Stop Pushing—A Science-Based Method in Three Simple Steps | A Conversation With Author Dr. Alison Escalante MD | Audio ...
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35
Guests: Alison Escalante, Author, Pediatrician On LinkedIn | https://www.linkedin.com/in/alisonescalantemd/ On Twitter | https://twitter.com/AEscalanteMD Website | https://theprimarycarer.com/ _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcas…
…
continue reading
1
Inside SendGrid's phishy business. [Research Saturday]
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55
Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. Hackers behind this novel phishing campaign us…
…
continue reading
1
Inside SendGrid's phishy business. [Research Saturday]
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55
Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. Hackers behind this novel phishing campaign us…
…
continue reading
1
Cyber Security Today Week in Review with David Shipley, Beauceron Security: Mach 16th, 2024
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12
Here's our week in review stories that David and guest host Jim Love will discuss: Cyber Pros flock to cybercrime side hustles. I covered this earlier this week. This story came out of the UK and a report that an ex-cop went undercover on the dark web and discovered that there were a lot of cybersecurity professionals who were moonlighting or offer…
…
continue reading
1
Hong Kong Deepfake Heist + Three Million Toothbrush Botnet + Hacked Canada
57:39
57:39
Play later
Play later
Lists
Like
Liked
57:39
A chatty chat episode in which Scott and Jordan discuss the proposed Flipper Zero ban in Canada, a chatbot that lied to an airline passenger, a multimillion dollar deepfake heist in Hong Kong, and the Satoshi Nakamoto court trial currently underway. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
A Conversation with David Lillefloren | The Leadership Student Podcast with MK Palmore
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20
Guest: David Lillefloren, CEO, Sunraycer On LinkedIn | https://www.linkedin.com/in/david-lillefloren-4b2b821/ ______________________ Host: MK Palmore, Host of The Leadership Student Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/mk-palmore ______________________ This Episode’s Sponsors Are you interested in …
…
continue reading
1
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353
1:57:11
1:57:11
Play later
Play later
Lists
Like
Liked
1:57:11
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'…
…
continue reading
1
Addressing Identity-Related Threats in 2024 - Rod Simmons - ESW #353
1:57:11
1:57:11
Play later
Play later
Lists
Like
Liked
1:57:11
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'…
…
continue reading
1
Week in Review: Russian Microsoft exfiltration, JetBrains Rapid7 feud, Change Healthcare fallout
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Alexandra Landegger, Executive Director and CISO Collins Aerospace Thanks to our show sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compli…
…
continue reading