Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
Investigative journalist Geoff White takes you inside the stories behind the stories - detailing the twists, turns, dead ends and surprises that await in the murky world of cybercrime.
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations' networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
Behind every signature, every unread clause, and every “I didn’t know…” lurks a shadow—one that could cost you your freedom, your business, or your life. Legaloa Shadow is a gripping legal thriller podcast that blurs the line between fiction and frightening truth. Each episode tells a story inspired by real Philippine laws—from cybercrime and data privacy breaches to overlooked contracts and workplace violations—designed to haunt anyone who thinks ignorance of the law is harmless. In this da ...
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
The C Suite podcast is elevating cyber literacy for everyday people. Join Claudette McGowan, TD Bank’s Global Executive Officer for Cyber Security, as she explores how cyber-attacks happen and what we can do to avoid them. From phishing schemes to robocalls and even huge corporate hacks, on this show, Claudette meets with C Suite leaders to discuss cyber challenges and ways to help people become more protected and resilient.
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
When the World Wide Web was created, could we ever have imagined our ability to use the internet - or not use it - turning our lives upside down? And that in the wrong hands, this new digital world could give criminals the opportunity to cause havoc at the flick of a switch? Narrated by award-winning actor Adrian Lester, True Cybercrime Stories recounts what happened on those fateful days when some of the biggest cyber crimes in recent history took companies, governments and public services ...
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech world—one episode at a time. Stay informed, stay inspired!
Följ med på en resa in i internets mörkaste hörn. Vill du höra mer? Stöd mig gärna på https://www.patreon.com/natetsmorkasida och få tillgång till exklusiva avsnitt, videos och mycket mer. Frågor, förslag, affärer? Kontakta mig på porsklevproduktion@gmail.com Support till showen http://supporter.acast.com/natets-morka-sida. Du kan även stödja podden på acast+ här: https://plus.acast.com/s/natets-morka-sida https://plus.acast.com/s/natets-morka-sida. Hosted on Acast. See acast.com/privacy for ...
This podcast was inspired by the evolving Covid-19 restrictions and how it has impacted compliance professionals working in financial crime prevention. Reaching out to individuals across the globe, hosts Samantha Sheen and Marie Lundberg look at how people are adjusting to remote working from home while still keeping up efforts to detect, prevent and disrupt financial crime. The topics covered range from governance, KYC, transaction monitoring to cyber security and accountability.Taking a pl ...
Welcome to TreasuryCast, the podcast series brought to you by Treasury Management International, a well-respected and independent voice in the treasury world. TreasuryCast showcases topical, pragmatic solutions and strategic insights providing valuable material for all practitioners, from experienced treasurers and CFOs to those new to the profession.
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
You thought you knew all about drones. Turns Out. You know nothing at all ... Today in Drone News: Love Bytes-- Get a Drone: Our resident drone scientist, J.A. Thomas, has teleported to the year 2049 where she is bringing you the latest & greatest from your favorite 4 legged Unmanned Ariel Vehicles. Join her as she cuts through the sometimes confusing jargon of tech products and services to help you analyze opportunities and decide what service drones are best for you. Proudly sponsored by: ...
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
From tales of historical idiocracy and scientific genius to weird and wacky cultural phenomena, Dr Rod Lamberts and Dr Will Grant are here to take you on a wild conversational journey, deep diving into the crevices of science, history and culture that you never knew existed.
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Quintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses ...
Computerlaw Group LLP (www.computerlaw.com) provides strategic, knowledgeable, and effective business and intellectual property protection, licensing and litigation services to Internet, e-commerce, computer software, hardware and other high-tech businesses, teams and industry professionals throughout California, nationally and around the world. CLG produces THE VALLEY CURRENT as a way to keep its worldwide clients, co-counsels, colleagues, and friends aware of developments in Silicon Valley ...
A podcast, hosted by Jose Sanchez (CU Boulder Sociology PhD Candidate) and Jennifer Tostlebe (Assistant Professor of Criminology and Criminal Justice, University of Nebraska-Omaha), where we talk about research in the field of criminology with field experts, our own work, and life as grad students. We will be releasing episodes every 2 weeks. Twitter --> Jose @jsanchez318 and Jenn @jenntostlebe. For those listening on Apple Podcast, subscribe, rate and review! Follow us on Twitter, Facebook ...
In this gripping episode of TechDaily.AI, we break down the FBI’s latest cybercrime statistics and expose the alarming rise in online scams, ransomware attacks, and investment fraud—costing victims over $12.5 billion in a single year. 🔍 Key topics we cover: The FBI’s role in fighting cybercrime through IC3 and the Recovery Asset Team (RAT) Shocking…
Rinki Sethi is a top global CISO, board member, and cybersecurity expert. In this episode, she joins host Amanda Glassner from the RSA Conference 2025 to discuss women in cybersecurity, how attendance at the event this year panned out, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com…
Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Disne…
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
In this eye-opening episode of Insurance Journal’s Academy of Insurance After Show, host George sits down with Academy Director Patrick Wraight and cybersecurity expert Tom Wetzel to unpack the double-edged sword facing insurance agencies in 2025: AI and cybercrime. From AI-powered phishing schemes to the rise of threats, Tom dives deep into how fa…
📌 We apologize for the technical issues experienced while filming this episode. Now onto the episode details: Oracle recently faced a major security scare after a hacker claimed to have stolen 6 million data records — a breach that has everyone talking. After initially denying the breach, Oracle is now saying their Oracle Cloud Infrastructure has n…
G'day science lovers! Buckle up, because today we're diving into everything from bottom-end evolution to deliberately poisoning yourself and your child with a deadly jellyfish (yes, really). Here’s a recap of our recent escapade through intriguing science headlines. From evolutionary hand-me-downs to jellyfish on holiday, brain-powered symphonies t…
Navigating cannabis regulations is straightforward—just follow the rules. But when it comes to hemp, it’s a whole different ball game. With limited state regulations, hemp businesses face uncertainty, making it crucial to adopt best practices like GMP (Good Manufacturing Practices) to stay ahead. However, the real risk comes from unscrupulous actor…
Heather Barnhart and Paul Lorenz join the Forensic Focus Podcast to discuss key insights from Cellebrite's 2025 DFIR Industry Trends Survey. They dive into the challenges facing digital forensics today - from locked devices and encrypted applications to overwhelming case backlogs. The survey, which gathered responses from over 2,100 professionals a…
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
In this deep dive, we explore the crucial decision-making process behind synchronous vs. asynchronous communication in modern tech systems. We cover the impacts on system architecture, performance, and resilience, with insights into the pros and cons of each. Whether you're designing a simple website or a complex microservices architecture, underst…
In this episode of Techaily.ai, we break down the concept of performance pyramids—powerful hierarchical frameworks that drive improvement at every level, from personal development to elite athletic training and organizational excellence. Sponsored by StoneFly, your enterprise partner for storage, backup, disaster recovery, and cloud solutions, we e…
In 1804, enslaved Haitians successfully overthrew French colonial rule and founded the world's first Black republic. But by 1825, the French returned and demanded Haiti to pay “reparations” for French financial losses, including the value of the lives of the formerly enslaved. With warships off its coast, Haiti was forced to agree to an indemnity d…
Ever typed a URL and landed exactly where you wanted? Thank DNS. But what happens when that system is hijacked? In this eye-opening deep dive, we unpack how the Domain Name System (DNS)—the internet's invisible address book—can be weaponized by cybercriminals. From DNS cache poisoning to domain hijacking, rebinding attacks, and covert data exfiltra…
In this deep-dive episode of TechDaily.AI, we explore how artificial intelligence is transforming the cybersecurity landscape—both as a weapon for attackers and a shield for defenders. From deepfake detection to proactive threat mitigation and automated incident response, we break down the real-world applications, benefits, and risks of integrating…
In this eye-opening episode of TechDaily.AI, we uncover the stealthy persistence tactics cyber attackers use to maintain access on Windows systems — even after reboots and logoffs. From scheduled tasks to startup scripts, registry hacks, and Windows service manipulation, we break down how legitimate Windows features are turned into backdoors for ma…
Vangelis Stykas is the co-founder and CTO at Atropos. In this episode, he joins host David Braue to discuss vulnerabilities uncovered in rooftop solar panels, the potential impact this could have on Europe’s power grid, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com…
Andrea Wells from Insurance Journal reports from RIMS RiskWorld 2025, where she interviewed Ray Ash, EVP and Head of Financial Lines at Westfield Specialty. They discussed the latest changes in the risk management industry following the new administration’s policies. Key topics include the economic impact of tariffs, the SEC’s approach to digital a…
Andrea Wells from Insurance Journal reports from RIMS RiskWorld 2025, where she speaks with Patrick Thielen, Global Head of Cyber at Liberty Mutual Insurance. They discuss the evolving landscape of cyber risk, focusing on how policies are shifting from data breach coverage to operational risks like business interruption and data restoration. Patric…
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work Hacks, Infosec Boot Camp instructor Wilfredo Lanz discusses the importance of Microsoft Azure certifications for IT and security professionals. With over 9…
In this episode of TechDaily.AI, we dive deep into the architecture of a modern cybersecurity platform designed for today’s hybrid environments—covering cloud, containers, servers, and endpoints. You’ll learn how lightweight agents, centralized analysis, and integrated dashboards come together to provide real-time protection, compliance support (GD…
Struggling to keep up with the endless flood of new information? You're not alone—and this episode of TechDaily.AI has you covered. We’re diving deep into 15 science-backed strategies to help you learn complex topics faster, retain knowledge longer, and actually enjoy the process. Whether you're a student, a tech pro, or just curious, these actiona…
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
Cybersecurity Today: Disney Data Theft, Signal Gate, and Major Apple Vulnerability In this episode of Cybersecurity Today, host David Shipley discusses several key security incidents. Hacker 'Null Bulge,' real name Ryan Kramer, pleads guilty to stealing over 1.1 TB of data from Disney's Slack via malware disguised as an AI image generation tool. Ad…
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
Welcome to AI Weekly Insights — your go-to podcast for the latest breakthroughs in artificial intelligence and machine learning! This episode covers the U.S. passing the landmark Take It Down Act to criminalize non-consensual deepfake content, Google’s powerful AI Mode in Search reshaping online queries, Amazon Web Services’ release of its most adv…
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
In this episode of Cybersecurity Today, host Jim Love is joined by roving correspondent David Shipley to discuss his experiences at the BSides and RSAC conferences. They dive into the significant takeaways from BSides, including highlights from notable presentations such as Truffle Hog's AI Apocalypse and Eva Galperin's talk on the 'World's Dumbest…
As artificial intelligence revolutionizes automation and insights, it also sparks a growing concern: what happens to our privacy? In this deep dive, we explore the complex relationship between AI and data privacy—from the ethical dilemmas of data collection to the unintended consequences of machine learning bias and hyper-targeted advertising. You'…
In this episode of TechDaily.AI, we explore how businesses are overcoming IT infrastructure challenges through StoneFly’s Cloud Foundation (SCF) and Migration-as-a-Service (MaaS). Discover how StoneFly’s trusted SCSPs (StoneFly Cloud Service Providers) help companies reduce costs, improve scalability, ensure resilience, and tackle common migration …
Is your innovation stuck in the slow lane of the patent process? Discover how the USPTO’s Track One Prioritized Examination Program can cut your patent approval time from 2+ years down to just 12 months—or even faster. In this episode of TechDaily.AI, we break down: What the Track One program is and how it works Who qualifies and what you need to a…
In this episode of The Deep Dive, we break down the evolving landscape of Threat Detection and Response (TDR) by comparing SIEM (Security Information and Event Management) and XDR (Extended Detection and Response). You'll learn: The core strengths and trade-offs of SIEM and XDR How automation, AI, and visibility shape threat detection Why some orga…
In this episode of Techdaily.AI, we explore the explosive revelations of "SignalGate"—a controversy involving high-ranking U.S. officials allegedly using insecure personal apps like Signal and Gmail to share sensitive military and national security information. We break down the risks, the real-world consequences of poor cybersecurity habits, and w…
A sudden and dramatic spike in enterprise VPN scanning activity has cybersecurity experts on high alert. In this urgent episode of TechDaily.AI, we break down: The rise of coordinated reconnaissance targeting enterprise VPNs What this surge signals about potential future cyberattacks Why using end-of-life (EOL) VPN systems is dangerously risky Acti…
IBM is doubling down on U.S. technology leadership with a bold $150 billion investment strategy—and quantum computing and mainframes are at the center of it. In this episode, we break down IBM’s shift from qubit counts to quality operations, the launch of quantum-centric supercomputing, and how mainframes are evolving with AI and hybrid cloud. We a…
In this deep-dive episode of TechDaily.AI, we unravel the rising tide of cybercrime and show you how to fight back with real-world strategies for building cyber resilience. From ransomware attacks on city governments to breaches in major hospitality chains, no organization is immune. But what separates those who recover from those who collapse? We …
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on The Office of the Comptroller of the Currency. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and …
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
On this episode of the Inside the FBI Podcast, we're warning the public about a financial fraud scheme involving scammers who impersonate Chinese law enforcement and target the U.S.-based Chinese community—in particular, Chinese students attending American universities. For a full transcript and additional resources, visit fbi.gov/news/podcasts. If…
In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…