show episodes
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Welcome to Time for a Reset Marketing Podcast, where we sit down with top marketing leaders representing the biggest and most beloved brands. Our mission? To uncover the secrets behind driving change in today’s rapidly evolving world. From understanding shifting consumer behavior to recognizing the increasing importance of marketing in driving business growth, our podcast delves deep into the strategies and insights that are shaping the future of marketing. Each episode is a treasure trove o ...
  continue reading
 
Artwork

1
On Violent Extremism

CSIS | Center for Strategic and International Studies

Unsubscribe
Unsubscribe
Monthly
 
Shannon N. Green, former director and senior fellow of the CSIS Human Rights Initiative and former managing director of CSIS’s Commission on Countering Violent Extremism (CVE), explored the violent extremism phenomenon – its causes, manifestations, and responses. In each episode, Shannon sat down with a different expert or practitioner, building a mosaic of voices and perspectives on CVE from all around the world.
  continue reading
 
Artwork

1
Decoding Counterterrorism

Royal United Services Institute

Unsubscribe
Unsubscribe
Monthly
 
Exploring some of the key concepts in preventative counterterrorism work, drawing on global experience and RUSI research. Over the past few years, RUSI’s Terrorism and Conflict group has conducted multiple and extensive reviews of global preventing and countering violent extremism (P/CVE) programmes, identifying what can work and what has not worked in these efforts. The research covered hundreds of programmes addressing different ideological motivations, with a particular focus on Islamist ...
  continue reading
 
Artwork

1
Inside Rehabilitation Counseling

Commission on Rehabilitation Counselor Certification

Unsubscribe
Unsubscribe
Monthly
 
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
Cyber Humanity

Immersive Labs

Unsubscribe
Unsubscribe
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Join hosts Eddie Knight and Josh Kelley as they look at the latest trends and current events in the industry! Whether you're new to DevOps or a veteran of the industry, this podcast will help you continuously improve your DevOps game.
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Artwork

1
Secret Skin

Open Mike Eagle

Unsubscribe
Unsubscribe
Monthly
 
Eagle is an L.A. based hip-hop artist. On Secret Skin, he and his guests examine what’s really going on behind the face that hip-hop artists put on for the public. The in-jokes. The heavy stuff. The tour stories. The day-to-day struggles and absurdities of being a working musician. The Secret Skin.
  continue reading
 
Loading …
show series
 
A critical vulnerability (CVE-2024-24919) with a CVSS score of 8.6 has been discovered in EOL Check Point devices, allowing remote attackers to read arbitrary files. The Hacktivist group "Ghost Clan Malaysia" has shared affected IP addresses worldwide. Upgrade to supported versions and apply necessary hotfixes immediately to protect your data and i…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Braodo Info Stealer, a Python-based malware, is targeting users in Vietnam and several other countries. This sophisticated threat spreads possibly through phishing emails, uses GitHub for hosting malicious code, and exfiltrates stolen data via Telegram channels. Learn more about this emerging threat impacting global cybersecurity. Link to the Resea…
  continue reading
 
“I think retail media has become a hot topic for several reasons. One is, obviously, the deprecation of cookies and the privacy changes. So, advertisers are looking for new data sources, and retailers have incredibly rich consumer data.” Carl Carter SVP of Media & Analytics at Circana In this episode of Time For a Reset: The Marketing Podcast with …
  continue reading
 
Stay informed about the latest developments in cybersecurity with CYFIRMA's Tracking Ransomware-June 2024 Report. This month's report highlights key trends, including a decrease in ransomware attacks by groups like Play and RansomHub, while Akira and Qilin increased their operations. Discover significant changes in targeted industries, with most se…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
We love to hear from you! As I said in part of this two part series episode, It's easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The frequency and scale of these incid…
  continue reading
 
Critical Alert: Organizations using PHP in CGI mode must act now! CVE-2024-4577 presents a severe risk of remote code execution. With millions of websites potentially affected globally, immediate action is crucial. Attackers can exploit CGI argument injection to execute arbitrary commands, leading to unauthorized access or server compromise. Update…
  continue reading
 
The CYFIRMA team has uncovered "Kematian-Stealer," a sophisticated info stealer targeting Windows systems, hosted on GitHub. This open-source malware is designed to stealthily extract data from a wide range of sources, including browsers, cryptocurrency wallets, messaging apps, gaming platforms, VPNs, and email clients. Kematian-Stealer employs adv…
  continue reading
 
On this episode of Inside Rehabilitation Counseling, Sarah Price Hancock joins us to discuss her journey as a Certified Rehabilitation Counselor. Following a misdiagnosis of “treatment resistant” mental illness, Sarah received 116 bilateral electroconvulsive therapy (ECT) treatments resulting in Delayed Electrical Injury’s Myoneural Disorder. Sarah…
  continue reading
 
This year’s Olympic games come at a heightened moment for international conflict & terrorism. The potential for a jihadi group or individuals inspired by one to take the world’s attention with a potential attack or for Russia to try to embarrass France with acts of sabotage are very high. Link to the Research Report: Paris Olympics - CYFIRMA #Geopo…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
We love to hear from you! It's easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The frequency and scale of these incidents can make it seem like our digital world is und…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
“As marketers, we have to be able to adapt and be flexible. We have to be willing to experiment and try new things because the tools and technologies are changing so rapidly.” Michael Smith In this episode of Time For a Reset: The Marketing Podcast with Globa Brand Leaders, host Paul Frampton connects with Michael Smith, CMO of NPR, the National Pu…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
In this preview of the next episode of Inside Rehabilitation Counseling, Sarah Price Hancock joins us to discuss her journey as a Certified Rehabilitation Counselor. Following a misdiagnosis of “treatment resistant” mental illness, Sarah received 116 bilateral electroconvulsive therapy (ECT) treatments resulting in Delayed Electrical Injury’s Myone…
  continue reading
 
Cyfirma research team has examined a variant of Lumma Stealer malware, and this report provides a comprehensive analysis of this advanced information-stealing malware, explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Lumma S…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
We love to hear from you! In this episode, we’re focusing on the rising trend of IT outsourcing and its implications for cybersecurity. As more businesses delegate non-core tasks to third-party providers, they inadvertently open doors to trust relationship attacks. We'll explore how attackers exploit the trust between companies and their service pr…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
CYFIRMA's latest investigation reveals how terrorist groups in Kashmir are still exploiting digital platforms to spread propaganda and influence people. Their psychological operations (Psy Ops) aim to manipulate public perception, spread fear, and destabilize the region. Despite a reduction in physical presence, groups like TRF and Kashmir Tigers a…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
We love to hear from you! This week's episode will continue with part 2 of "The Importance of Automation and Orchestration in Cyber Security." As I said in the episode one, the need for efficient and effective security measures has never been more critical. I suggest you listen to E1, before you dive into this one. Without further ado, lets first g…
  continue reading
 
“Anyone can actually produce really high-quality content right now and marketing campaigns. And I think that is putting smaller companies or more agile companies in a good position.” Lars Silberbauer In this episode of Time For a Reset: The Marketing Podcast with Global Brand Leaders, host Paul Frampton connects with a range of industry experts at …
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Loading …

Quick Reference Guide