show episodes
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
The story of the world's most secret agents...the backups. For the first time in his career, Special Agent Chet Phillips has discovered that he can choose NOT to accept a mission! That means there's no choice but to send in the "B Team": A nervous pencil pusher promoted to the field, a computer hacker working off her sentence, a fading former sitcom star and a recently reassigned White House intern. A full cast comedy audio adventure with a new episode debuting each month!
  continue reading
 
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
  continue reading
 
Artwork
 
Catch up on all the best stories and discussion on Hacker New each week. Hosted by Colin (a YC-backed founder and typescript fanatic) and Kenny (a human-computer interaction whiz who just wants software to be fast).
  continue reading
 
Artwork

1
Modem Mischief

Keith Korneluk

Unsubscribe
Unsubscribe
Monthly+
 
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
  continue reading
 
Artwork

1
Dark Web Today

Alberto Hill

Unsubscribe
Unsubscribe
Monthly
 
Information you will not read about in the press... by @adanielhill 1st hacker that served time in prision in #uruguay for a computer crime. https://my.darkweb.today/mydarkweb/
  continue reading
 
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
  continue reading
 
Artwork

1
Motherlode

Ranieri & Co.

Unsubscribe
Unsubscribe
Weekly
 
Introducing Motherlode, a Ranieri & Co. production. The gripping story about the birth of computer hacking from an unlikely centre - Melbourne Australia. It was here teenage boys, and they were mostly boys, hacked into some of the biggest organisations in the world. It’s also where a young hacker, Julian Assange, cut his teeth on computers and went on to develop Wikileaks, the most disruptive website the world has seen. But Wikileaks didn’t just spring up out of nowhere. It was 20 years in t ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

Unsubscribe
Unsubscribe
Monthly
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
  continue reading
 
Följ med på en resa in i internets mörkaste hörn. Vill du höra mer? Stöd mig gärna på https://www.patreon.com/natetsmorkasida och få tillgång till exklusiva avsnitt, videos och mycket mer. Frågor, förslag, affärer? Kontakta mig på porsklevproduktion@gmail.com Support till showen http://supporter.acast.com/natets-morka-sida. Du kan även stödja podden på acast+ här: https://plus.acast.com/s/natets-morka-sida https://plus.acast.com/s/natets-morka-sida. Hosted on Acast. See acast.com/privacy for ...
  continue reading
 
Artwork

1
Facts Matter

The Epoch Times

Unsubscribe
Unsubscribe
Weekly+
 
Let's connect the dots. As America moves into uncharted waters, it’s incredibly important for you to have an honest source of news because right now, what this republic needs more than anything else, are informed citizens who are grounded in facts. Facts Matter investigates complex issues, and then presents the findings in a way that is easy to understand. We work to bring you honest news without spin. We are free from the influence of any government, corporation, or political party. Our goa ...
  continue reading
 
Dive into the electrifying world of electrical engineering with Circuit Break, a MacroFab podcast hosted by Parker Dillmann and Stephen Kraig. This dynamic duo, armed with practical experience and a palpable passion for tech, explores the latest innovations, industry news, and practical challenges in the field. From DIY project hurdles to deep dives with industry experts, Parker and Stephen's real-world insights provide an engaging learning experience that bridges theory and practice for eng ...
  continue reading
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
  continue reading
 
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
7th Son: 7 Days is a audio prequel anthology to J.C. Hutchins' thriller novel, 7th Son: Descent. Set two weeks before Descent’s extraordinary events, the series reveals the lives of seven seemingly unrelated men, and their everyday challenges. In the world of 7th Son, "everyday challenges" are far from ordinary. Each of these seven stories stars a unique John Michael Smith. Witness criminal profiler Dr. Mike's quest to hunt an unstoppable serial killer. Watch blue-collar musician John realiz ...
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
  continue reading
 
Artwork

1
TheOxfordAmbientCollective

TheOxfordAmbientCollective

Unsubscribe
Unsubscribe
Monthly
 
I started creating music on my old PC back in 2002 using DAWs such as Buzz, Fl Studio and Reason. As my artist name suggest I mostly compose tunes that have an ambient edge. My main passion is creating soundscapes, be they soft drifting drones/piano pieces/heavily synth driven, weirdly abstract and classical and orchestral pieces. I mainly compose using apps on my IPad but also make use of whatever instruments I have lying around such as my Pocket Operators, Modal Craftsynth, my favourite is ...
  continue reading
 
Artwork

1
We think we know

Pentest-Tools.com

Unsubscribe
Unsubscribe
Monthly+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
  continue reading
 
Synchronicity machines. Difference engines melded with the iChing. Geomancy: the art of making stone float with sound. The hacker collective 'Anonymous'. Secret societies … This is the world of ARMAND PTOLEMY, a new action-adventure hero. Facing an enemy armed with the Golden Aleph -- a mystical device that allows its wielder to see holographically into every point in time and space, Ptolemy must use every trick of his Oxford-educated mind and circus-trained body to succeed. But how do you f ...
  continue reading
 
Breaking down science, technology, engineering and math in a way that the rest of us can comprehend and utilize in our daily lives. Imagine a Lex Fridman for the everyman, translating the complex thoughts of the worlds greatest thinkers like Lee Cronin, Razib Khan and the CTO of Signal, preeminent encrypted messaging app. This podcast is inspired by Andrew Huberman, Lex Fridman, Chamath Palihapitiya, Jason Calacanis, David Sacks, David Friedberg, Jocko Willink, Tim Ferris, Balaji Srinivasan.
  continue reading
 
Loading …
show series
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
The Paris Olympics is threatened by threats of art heists and assassinations…and President Chet Phillips is having a Dole Whip. Written by John Dowgin and J. Michael DeAngelis Directed by Pete Barry and J. Michael DeAngelis Starring Chris Klaniecki as Skip Granger Nazli Sarpkaya as Mackenzie McGrath Dave Stanger as Bowden Montcrief Paige Klaniecki …
  continue reading
 
French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getti…
  continue reading
 
(0:10): Star Wars Outlaws: Thrilling Gameplay and Visuals Amid PS5 Bug and 'Open-World Fatigue' (2:02): Google Meet Unveils AI Note-Taking Feature to Boost Meeting Productivity (3:45): Anthropic's Claude Chatbot Launches Artifacts and Publishes System Prompts in AI Transparency Push (5:50): OpenAI Unveils 'Strawberry' to Boost AI Reasoning; Launche…
  continue reading
 
Threat actors use a malicious Pidgin plugin to deliver malware. The BlackByte ransomware group is exploiting a recently patched VMware ESXi vulnerability. The State Department offers a $2.5 million reward for a major malware distributor. A Swiss industrial manufacturer suffers a cyberattack. The U.S. Marshals Service (USMS) responds to claims of da…
  continue reading
 
(0:10): Zuckerberg Admits to Biden Admin Pressure on COVID-19 Censorship; Pledges Future Resistance (1:55): Apple Names Parag Parekh New CFO as Luca Maestri Transitions Amid Major Product Launches (3:39): PlayStation Launches PC App for DualSense Edge Customization, Enhancing Gaming Experience (5:30): Chinese Hackers Exploit Zero-Day Bug to Breach …
  continue reading
 
In this episode, Roland Clouthier, former CSO of TikTok and cybersecurity expert, explores the role of AI in cybersecurity, the evolving landscape of cloud security, and the critical importance of identity management. Roland shares insights on how to effectively allocate security budgets, the importance of understanding risk tolerance, and the need…
  continue reading
 
Hacktivists respond to the arrest of Telegram’s CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A flaw in Microsoft 365 Copilot allowed attackers to exfiltrate sensitiv…
  continue reading
 
(0:10): Telegram CEO Arrested in France: Implications for Free Speech and Cryptocurrency (1:56): Dutch DPA Slaps Uber with Record €290M Fine for GDPR Breach in Driver Data Transfer to U.S. (3:59): AI Revolutionizes Cybersecurity Amidst Rising BYOAI Risks and Upcoming Regulations (5:52): California's AI Safety Bill Nears Vote: New Rules Could Shape …
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
How are personal liability and indemnification impacting the CISO role? Darren Shou, Chief Strategy Officer from RSA Conference, describes the current landscape of CISO liability and the challenges facing CISOs today. He discusses the implications of the SEC's recent actions, including the charges against SolarWinds' CISO, and the growing trend of …
  continue reading
 
Telegram’s CEO is arrested by French police, presumably over moderation failures. A cyberattack disrupted services at Seattle-Tacoma International Airport and the Port of Seattle. SonicWall has warned customers of a critical vulnerability that could lead to unauthorized access or a firewall crash. Dutch and French regulators fined Uber €290 million…
  continue reading
 
(0:10): Telegram Founder Arrested in Paris: Drug Trafficking and Fraud Allegations Shake Crypto Community (2:09): Ford Revamps EV Strategy: New Electric Pickups and Van Take Center Stage Amid Market Challenges (4:16): AI Coding Assistants Revolutionize Development, Boost GitHub Revenue by 45%, Spark Workforce Concerns (6:28): Commerce Minister Goya…
  continue reading
 
The headlines have been on fire with stories about 3 billion people’s data being leaked from a company you’ve never heard of. But like many such stories, the mainstream media gets a lot of the important details wrong and glosses over a lot of the important nuances. Today we’re going to dive into what really happened and what you should do about it,…
  continue reading
 
Enjoy this special encore episode, where we are joined by Vice President of Global Systems Engineering Ellen Sundra and she shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in provi…
  continue reading
 
In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Dustin Moody, mathematician at NIST, about their first 3 recently finalized post-quantum encryption standards. NIST finalized a key set of encryption algorithms designed to protect against future cyberattacks from quantum computers, which operate in fundamentally diff…
  continue reading
 
Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. By mapping the cyber an…
  continue reading
 
The exploitation of the LiteSpeed Cache Wordpress plugin has begun. Halliburton confirms a cyberattack. Velvet Ant targets Cisco Switch appliances. The Qilin ransomware group harvests credentials stored in Google Chrome. Ham radio enthusiasts pay a million dollar ransom. SolarWinds releases a hotfix to fix a hotfix. A telecom company will pay a mil…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart cards could be easily backdoored. The FAA proposes new cybersecurity rule…
  continue reading
 
If you want to understand cybersecurity policy, it’s not enough to focus on Washington D.C. — you have to also grok the American tech industry. Few people have bridged that divide more effectively than Ted Schlein, the legendary venture capitalist who is currently at Ballistic Ventures. On this episode of Safe Mode, he sits down with host Elias Gro…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
(0:10): Ford Revamps EV Strategy with New Electric Pickups and Van Amid Price Wars and Competition (1:56): Google Pixel 9 Pro Launch: AI-Powered Features and Enhanced Camera, Priced at Rs 79,999 (4:06): EA Sports College Football 25 Shatters Records, Boosts Gaming Sales in 2024 (5:55): Microsoft's Windows Recall Faces Privacy Backlash, Delayed for …
  continue reading
 
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
  continue reading
 
Tap water is one of those things that many of us take for granted. Typically, as long as you pay the bill, you turn the faucet, and the water flows. 🇺🇸 Epoch Times 25¢ Sale: https://ept.ms/RomanSale1 Hackers in other countries that want to do harm to America see an opportunity. They see it as a perfect weapon—a weapon that can be used to kill, inju…
  continue reading
 
A major American chipmaker discloses a cyberattack. Cybercriminals exploit Progressive Web Applications (PWAs) to bypass iOS and Android defenses. Mandiant uncovers a privilege escalation vulnerability in Microsoft Azure Kubernetes Services. ALBeast hits ALB. Microsoft’s latest security update has caused significant issues for dual-boot systems. Th…
  continue reading
 
(0:10): Apple Preps for Big Launch: iPhone 16, Apple Watch Series 10, and iOS 18 Beta Updates (1:59): Authors Sue Anthropic Over Unauthorized Use of Books to Train Claude AI (4:02): EU Slashes Tariffs on Tesla's China-Made Cars to 9%, Escalating Trade Tensions with China (6:14): NVIDIA Unveils Major RTX and DLSS Integrations at Gamescom 2024, Boost…
  continue reading
 
In this episode of "Reimagining Cyber," Rob Aragao hosts a conversation with Tammy Klotz, a best-selling author and current CISO at Trinseo. Tammy discusses her career trajectory, which includes leadership roles at Covanta Energy and Versum Materials, and shares insights from her recent book, Leading with Empathy and Grace: Secrets to Developing Hi…
  continue reading
 
The Dem’s 2024 party platform touches on cybersecurity goals. The feds warn of increased Iranian influence operations. A severe security flaw has been discovered in a popular WordPress donation plugin. The Lazarus Group exploits a Windows zero-day to install a rootkit. Krebs on Security takes a closer look at the significant data breach at National…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
Loading …

Quick Reference Guide