Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
…
continue reading
T
To The Point - Cybersecurity


1
To The Point - Cybersecurity
Forcepoint | Global Cybersecurity Leader | Security. Simplified.
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
…
continue reading
A fun and informative cybersecurity audio glossary from the CyberWire.
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Control Loop: The OT Cybersecurity Podcast
N2K Networks
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
T
The Bid Picture - Cybersecurity & Intelligence Analysis


1
The Bid Picture - Cybersecurity & Intelligence Analysis
Bidemi Ologunde
A podcast that features news, facts, some opinion, and conversations with guests on the day-to-day implications of cybersecurity.
…
continue reading
K
Kill Chain: A Platform Cybersecurity Podcast

1
Kill Chain: A Platform Cybersecurity Podcast
Fleet Defender
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
How to manage Cybersecurity Risks and Regulations without losing your sanity . Discussing that magical intersection between cybersecurity and financial services regulations. No jargon, no scare stories. Just Plain English news and advice.
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Geopolitics Decanted is a podcast featuring analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.silverado.org), a Washington DC-based non-profit with a mission to promote ...
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
S
Security Insights - Cybersecurity for Real-World Workplaces


1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
…
continue reading
Microsoft Vice Chair and President Brad Smith speaks with leaders in government, business, and culture to explore the world’s most critical challenges at the intersection of technology and society. As a 30-year veteran of an industry driven by disruption, Brad Smith hosts candid conversations with his guests that examine, reframe, and explore potential solutions to the digital issues shaping our world today, including cybersecurity, privacy, digital inclusion, environmental sustainability, a ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Hosted by Edward Walton, Andrea Fisher, Rod Trent, and Brodie Cassell, the Microsoft Security Insights show provides information, news, tips on the Microsoft Security Solutions including Microsoft Sentinel, Microsoft 365 Defender, and Azure.
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by The CyberWire as a public service.
…
continue reading
An overview of the biggest events in the industrial cybersecurity space this week from industrialcyber.co
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Where business & technology meet. Covering topics as diverse as cybersecurity, enterprise software, hardware, data centers, blockchain, AI, cloud, 5G and IIoT.
…
continue reading
Shared Security is a weekly cybersecurity and privacy podcast that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world. Hosted by industry professionals Tom Eston, Scott Wright and Kevin Johnson.
…
continue reading
C
Craig Peterson - America's Leading Technology News Commentator


1
Craig Peterson - America's Leading Technology News Commentator
Craig Peterson
Computers aren't just for business. Each week I look to the news and explain the stories that matter to you. From Ransomware and Hackers to Cameras I explain what the technology and cybersecurity news means to you and your business.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Join CovertSwarm and special guests, as they discuss the latest Cyber Security news, trends, 0-day exploits and research. www.covertswarm.com
…
continue reading
All the latest news, politics & information regarding the scam economy, how to spot scams and stop scammers, and how fraud victims can get justice.
…
continue reading
C
Cybersecurity Today


1
Cyber Security Today, May 22, 2023 - G7 nations speak out on cybercrime and artificial intelligence, the latest ransomware news, and more
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22
This episode reports on more financial penalties for a US firm's data breach, the PyPI registry can't keep up with added malware, Dole pays $US10.5 million to repair computers after ransomware attack and moreBy ITWC
…
continue reading
C
Cybersecurity Tech Brief By HackerNoon


1
Meet Blink Copilot: A Generative AI for Security Workflows
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46
This story was originally published on HackerNoon at: https://hackernoon.com/meet-blink-copilot-a-generative-ai-for-security-workflows. Meet Blink Copilot, the first ever generative AI for automating security and IT operations workflows. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclu…
…
continue reading
T
The Lawfare Podcast


1
Lawfare Archive: Rosa Brooks on ‘How Everything Became War and the Military Became Everything’
53:21
53:21
Play later
Play later
Lists
Like
Liked
53:21
From October 1, 2016: At this week's Hoover Book Soiree, Rosa Brooks joined Benjamin Wittes to talk about her new book, “How Everything Became War and the Military Became Everything: Tales from the Pentagon.” The book covers an extraordinary range of territory, from Brooks' personal experiences working as a civilian advisor at the Pentagon, to the …
…
continue reading
Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South an…
…
continue reading
Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South an…
…
continue reading
C
Cyber Security Headlines


1
Week in Review: Amazon Ring privacy violations, Gigabyte firmware problems, AI extinction threat
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13
Link to Blog Post This week’s Cyber Security Headlines - Week in Review, May 29-June 2, is hosted by Sean Kelly with our guest, Howard Holton, CTO, GigaOm Thanks to today’s episode sponsor, Barricade Cyber Have you fallen victim to a ransomware attack? Don’t worry! Barricade Cyber Solutions has helped thousands of customers in situations just like …
…
continue reading
C
CyberWire Daily


1
Hackers like to move it, move it. Skimmers observed targeting Americas and Europe. Hybrid war activity.
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
MOVEit Transfer software sees exploitation. A website skimmer has been employed against targets in the Americas and Europe. A look into XeGroup's recent criminal activity. Apple denies the FSB’s allegations of collusion with NSA. Kaspersky investigates compromised devices. Johannes Ullrich from SANS describes phony YouTube "live streams". Our guest…
…
continue reading
C
CYBER


1
The DHS Is Reading Travelers' Posts at the Border
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59
Customs and Border Protection is scanning people’s social media, the feds have arrested some swatters, and the FTC has ordered Ring to cough up a fine. This week on Cyber, Motherboard’s premier cyber crime reporter Joseph Cox is back to walk us through the latest in privacy violations done by Washington and the private sector. We’ll also take anoth…
…
continue reading
C
Cybersecurity Today


1
Cyber Security Today, Week in Review for the week ending Friday, June 2, 2023
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28
This episode features a discussion on a report into the ransomware attack on Newfoundland's IT healthcare system, a penalty paid by a US medical billing supplier over a data breach, an Australian company's estimate of the costs of a ransomware attack and the sentencing in the U.S. of two Nigerian cyber crooks.…
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
C
Cybersecurity Tech Brief By HackerNoon


1
Understanding Typosquatting: Threats and Countermeasures
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-typosquatting-threats-and-countermeasures. In this blog post, we’ll explore what typosquatting is and how it differs from cybersquatting, as well as provide tips on how to prevent it. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
T
The Microsoft Security Insights Show


1
Microsoft Security Insights Show Episode 155 - Ed Fisher
1:01:58
1:01:58
Play later
Play later
Lists
Like
Liked
1:01:58
Come join us as we talk with Ed Fisher about all things Microsoft security. Show links: The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA): https://github.com/cammurray/orca DMARCy MARC and the funky bunch: https://securityinsights.substack.com/p/dmarcy-marc-and-the-funky-bunch…
…
continue reading
It is often said that “Russia is a country with an unpredictable past.” Such distortions of history can lead to trouble, as the world witnessed last year when Vladimir Putin justified his invasion of Ukraine as an attempt to “denazify” the neighboring country—one with a Jewish president who lost relatives in the Holocaust. As Megan Buskey writes in…
…
continue reading
C
Cybersecurity Today


1
Cyber Security Today, June 2, 2023 - A new way of compromising the PyPI repository found, warning for MOVEit file transfer users, and more
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58
This episode reports on ransomware attacks, a proposed US$25 million fine against Amazon and moreBy ITWC
…
continue reading
C
Cyber Security Headlines


1
Amazon Ring privacy violations, Kaspersky triangulation APT, CyberCommand Hartman
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
Amazon Ring, Alexa accused of privacy violations by FTC Kaspersky reports on new mobile APT campaign targeting iOS devices White House to choose Army general Hartman to be Cyber Command No. 2 Thanks to today's episode sponsor, Barricade Cyber Solutions Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped …
…
continue reading
C
Cybersecurity Without Insanity


1
An insider threat, lots of spoof calls, and could our children be money mules?
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
This week: It’s a bank holiday weekend here in Ireland, and for some strange reason, the sun is also out. So, I was planning to keep this week’s Cyber 3-2-1 light-hearted. But now that I look at the stories I’ve picked – insider threats; 16,000 victims of cyber fraud; and warnings about our children becoming money mules – I’m not so sure. Anyway, I…
…
continue reading
S
Security Confidential


1
S11 E4 Once Wrestling a 750lb Bear, Now a Penetration Tester
38:46
38:46
Play later
Play later
Lists
Like
Liked
38:46
#SecurityConfidential #DarkRhinoSecurity Phillip is an offensive security professional, educator, mentor, author, and frequent public speaker. His passions outside of the technical side of cybersecurity are sharing resources, professional networking, and bringing people together. He is also the host of The Hacker Factory Podcast and his new podcast…
…
continue reading
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast click here.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
C
CyberWire Daily


1
Firmware comes in through the back door. Leveraging Adobe for credential harvesting. C2C market notes. Hybrid war updates.
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15
A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a “significant forensic discrepancy” in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundat…
…
continue reading
T
The Lawfare Podcast


1
Chatter: Information Ecology with Alicia Wanless
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05
Alicia Wanless is one of the pioneers of the idea of information ecology, the notion that we should think about information and disinformation as part of a complex ecosystem, the management of which she analogizes to environmental policy. Wanless has been complaining for several years that the war on “disinformation” skates over important question:…
…
continue reading
T
Tech means Business


1
Defining the Safer, Distributed Business Network
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41
The software-defined WAN (wide area network) is a piece of networking technology that simply makes life easier (and safer) for any organization with a distributed network. Instead of struggling to join MPLS, ADSL, and other interconnects together and then blanket the whole thing in encryption, SD-WAN handles all the details. Primary among SD-WAN su…
…
continue reading
C
Cybersecurity Tech Brief By HackerNoon


1
The Role of Identity and Access Management in The Security of Your Business
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43
This story was originally published on HackerNoon at: https://hackernoon.com/the-role-of-identity-and-access-management-in-the-security-of-your-business. Identity and Access Management (IAM) plays a critical role in safeguarding your digital assets and ensuring secure access for authorized users. Check more stories related to cybersecurity at: http…
…
continue reading
S
Security Breach


1
The Bad Guys Are Salivating Over Manufacturing
42:24
42:24
Play later
Play later
Lists
Like
Liked
42:24
Inside the resurgence of ransomware attacks and the rise of billion-dollar "unicorn" hacker gangs. Believe it or not, there was a time in recent history when we actually experienced a reprieve in ransomware attacks. According to a report from Black Kite, a leading provider of third-party risk management and cyber intelligence, a number of factors c…
…
continue reading
T
The Cybersecurity Defenders Podcast


1
Intel Chat: Donut, Agrius, Kimsuky, Pikabot, QBot & the Gootloader Initial Access-as-a-Service Operation.
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. FortiGaurd Labs encounters a kernel driver that makes use of the open-source donut tool. Checkpoint researchers observe Iranian threat actor Agrius operating against Israeli targets. SentielOne notes change…
…
continue reading
T
The CyberHub Podcast


1
Cyber News: Gigabyte Motherboard Backdoor, Toyota Breach Again, Zyxel Active Exploit & More Cyber News
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45
Cyber News: Gigabyte Motherboard Backdoor, Toyota Breach Again, Zyxel Active Exploit & More Cyber News Cybersecurity News CyberHub Podcast June 1st, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards Toyota finds more misconfigured servers leakin…
…
continue reading
D
Defense in Depth


1
How Must Processes Change to Reduce Risk?
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47
All links and images for this episode can be found on CISO Series. What do we need to do to fix our processes to truly reduce risk and vulnerabilities? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our spons…
…
continue reading
T
The Lawfare Podcast


1
The Wagner Group, Bakhmut, and a New Phase in the Ukraine War
52:06
52:06
Play later
Play later
Lists
Like
Liked
52:06
The war in Ukraine is approaching a pivotal moment. Russia remains in control of the hotly contested city of Bakhmut. But the ruthlessly effective mercenary forces of the Wagner Group—the same group whose leader, Yevgeny Prighozin, has openly bickered with the regular Russian military and reportedly offered to trade Russian troop positions to Ukrai…
…
continue reading
C
Cyber Security Headlines


1
More Toyota leaks, Gigabyte firmware issues, Twitter Community Notes for images
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57
Toyota finds more cloud leaks Gigabyte firmware update system insecure Twitter expands Community Notes to images Thanks to today's episode sponsor, Barricade Cyber Solutions Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped thousands of customers in situations just like yours. Their proprietary ransomw…
…
continue reading
…
continue reading
S
Smashing Security


1
.ZIP domains, AI lies, and did social media inflame a riot?
1:16:32
1:16:32
Play later
Play later
Lists
Like
Liked
1:16:32
ChatGPT hallucinations cause turbulence in court, a riot in Wales may have been ignited on social media, and do you think .MOV is a good top-level domain for "a website that moves you"? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, …
…
continue reading
C
CyberWire Daily


1
Two RAT infestations. Ghosts of sites past. Trends in identity security. Detecting deepfakes may prove more difficult than you think.
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16
SeroXen is a new elusive evolution of the Quasar RAT that seems to live up to its hype, and DogeRAT is a cheap Trojan targeting Indian Android users. Salesforce ghost sites see abuse by malicious actors. A look into identity security trends. People may be overconfident in their ability to detect deepfakes. Deepen Desai from Zscaler describes a camp…
…
continue reading
C
CyberCast


1
Season 5 Episode 10 - Marine Corps is Building a Unified Network to Operate in Highly Distributed Environments
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine n…
…
continue reading
S
Simply Cyber


1
🔴 May 31's Top Cyber News NOW! - Ep 377
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/the-gripping-tale-of-soc-2-certification. The story of AcmeCorp and its SOC 2 certification Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #saas-startups, #startups, #soc-2,…
…
continue reading
T
The CyberHub Podcast


1
Cyber News: MacOS SIP Bypass, Barracuda zeroday, WordPress Force Patch, CosmicEnergy Malware & More
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31
Cyber News: MacOS SIP Bypass, Barracuda zeroday, WordPress Force Patch, CosmicEnergy Malware & More Cybersecurity News CyberHub Podcast May 31st, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: Critical Apple macOS Vulnerability Allowing SIP Protection Bypass WordPress force installs critical Jetpack patch on 5 million …
…
continue reading
Episode 301 kicks off with Wired article exposes the China-backed Volt Typhoon Hack, a menacing cyberattack that poses a severe threat to critical infrastructure in the United States. With a specific focus on Guam's power grid control systems, this breach underscores the vulnerability and potential ramifications of such targeted attacks, Moving to …
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Taking a look at cyber insurance in the industrial space.
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41
China's Volt Typhoon snoops into US infrastructure, with special attention to Guam. Is CosmicEnergy just red-teaming, or is it a threat straight out of Red Square? Siemens patches a vulnerability endemic to the energy sector. An update on the Vulkan Papers. A cyberattack leads Suzuki to shut down its Indian production line. BlackBasta conducts rans…
…
continue reading
On Sunday, May 28, Turkey held a bitterly contested run-off election, with incumbent presidential candidate Recep Tayyip Erdoğan winning reelection against opposition candidate Kemal Kılıçdaroğlu. Lawfare Legal Fellow Saraphin Dhanani sat down with Soli Özel, Senior Lecturer at Kadir Has University in Istanbul and a columnist at Habertürk daily new…
…
continue reading
C
Cybersecurity Today


1
Cyber Security Today, May 31, 2023 - Almost 9 million victims in a data breach, a database of crooks is published, and more
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27
This episode reports on CAPTCHA evasion, more exploits added to the Murai botnet and moreBy ITWC
…
continue reading
C
Cyber Security Headlines


1
Experts warn of extinction from AI, Hackers demand $3 million from Scandinavian Airlines, Theranos founder surrenders to 11-year prison term
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23
Leading experts warn of a risk of extinction from AI Hackers demand $3 million from Scandinavian Airlines Theranos founder turns herself in for 11-year prison term Thanks to today's episode sponsor, Barricade Cyber Solutions Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped thousands of customers in si…
…
continue reading