show episodes
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
  continue reading
 
C
Click Here

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
  continue reading
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Geopolitics Decanted is a podcast featuring analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.silverado.org), a Washington DC-based non-profit with a mission to promote ...
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
  continue reading
 
Microsoft Vice Chair and President Brad Smith speaks with leaders in government, business, and culture to explore the world’s most critical challenges at the intersection of technology and society. As a 30-year veteran of an industry driven by disruption, Brad Smith hosts candid conversations with his guests that examine, reframe, and explore potential solutions to the digital issues shaping our world today, including cybersecurity, privacy, digital inclusion, environmental sustainability, a ...
  continue reading
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by The CyberWire as a public service.
  continue reading
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
S
Shared Security

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is a weekly cybersecurity and privacy podcast that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world. Hosted by industry professionals Tom Eston, Scott Wright and Kevin Johnson.
  continue reading
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
Loading …
show series
 
This episode reports on more financial penalties for a US firm's data breach, the PyPI registry can't keep up with added malware, Dole pays $US10.5 million to repair computers after ransomware attack and moreBy ITWC
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/meet-blink-copilot-a-generative-ai-for-security-workflows. Meet Blink Copilot, the first ever generative AI for automating security and IT operations workflows. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclu…
  continue reading
 
From October 1, 2016: At this week's Hoover Book Soiree, Rosa Brooks joined Benjamin Wittes to talk about her new book, “How Everything Became War and the Military Became Everything: Tales from the Pentagon.” The book covers an extraordinary range of territory, from Brooks' personal experiences working as a civilian advisor at the Pentagon, to the …
  continue reading
 
Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South an…
  continue reading
 
Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South an…
  continue reading
 
Link to Blog Post This week’s Cyber Security Headlines - Week in Review, May 29-June 2, is hosted by Sean Kelly with our guest, Howard Holton, CTO, GigaOm Thanks to today’s episode sponsor, Barricade Cyber Have you fallen victim to a ransomware attack? Don’t worry! Barricade Cyber Solutions has helped thousands of customers in situations just like …
  continue reading
 
MOVEit Transfer software sees exploitation. A website skimmer has been employed against targets in the Americas and Europe. A look into XeGroup's recent criminal activity. Apple denies the FSB’s allegations of collusion with NSA. Kaspersky investigates compromised devices. Johannes Ullrich from SANS describes phony YouTube "live streams". Our guest…
  continue reading
 
Customs and Border Protection is scanning people’s social media, the feds have arrested some swatters, and the FTC has ordered Ring to cough up a fine. This week on Cyber, Motherboard’s premier cyber crime reporter Joseph Cox is back to walk us through the latest in privacy violations done by Washington and the private sector. We’ll also take anoth…
  continue reading
 
This episode features a discussion on a report into the ransomware attack on Newfoundland's IT healthcare system, a penalty paid by a US medical billing supplier over a data breach, an Australian company's estimate of the costs of a ransomware attack and the sentencing in the U.S. of two Nigerian cyber crooks.…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-typosquatting-threats-and-countermeasures. In this blog post, we’ll explore what typosquatting is and how it differs from cybersquatting, as well as provide tips on how to prevent it. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
Come join us as we talk with Ed Fisher about all things Microsoft security. Show links: The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA): https://github.com/cammurray/orca DMARCy MARC and the funky bunch: https://securityinsights.substack.com/p/dmarcy-marc-and-the-funky-bunch…
  continue reading
 
It is often said that “Russia is a country with an unpredictable past.” Such distortions of history can lead to trouble, as the world witnessed last year when Vladimir Putin justified his invasion of Ukraine as an attempt to “denazify” the neighboring country—one with a Jewish president who lost relatives in the Holocaust. As Megan Buskey writes in…
  continue reading
 
Amazon Ring, Alexa accused of privacy violations by FTC Kaspersky reports on new mobile APT campaign targeting iOS devices White House to choose Army general Hartman to be Cyber Command No. 2 Thanks to today's episode sponsor, Barricade Cyber Solutions Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped …
  continue reading
 
This week: It’s a bank holiday weekend here in Ireland, and for some strange reason, the sun is also out. So, I was planning to keep this week’s Cyber 3-2-1 light-hearted. But now that I look at the stories I’ve picked – insider threats; 16,000 victims of cyber fraud; and warnings about our children becoming money mules – I’m not so sure. Anyway, I…
  continue reading
 
#SecurityConfidential #DarkRhinoSecurity Phillip is an offensive security professional, educator, mentor, author, and frequent public speaker. His passions outside of the technical side of cybersecurity are sharing resources, professional networking, and bringing people together. He is also the host of The Hacker Factory Podcast and his new podcast…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
  continue reading
 
A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a “significant forensic discrepancy” in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundat…
  continue reading
 
Alicia Wanless is one of the pioneers of the idea of information ecology, the notion that we should think about information and disinformation as part of a complex ecosystem, the management of which she analogizes to environmental policy. Wanless has been complaining for several years that the war on “disinformation” skates over important question:…
  continue reading
 
The software-defined WAN (wide area network) is a piece of networking technology that simply makes life easier (and safer) for any organization with a distributed network. Instead of struggling to join MPLS, ADSL, and other interconnects together and then blanket the whole thing in encryption, SD-WAN handles all the details. Primary among SD-WAN su…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-role-of-identity-and-access-management-in-the-security-of-your-business. Identity and Access Management (IAM) plays a critical role in safeguarding your digital assets and ensuring secure access for authorized users. Check more stories related to cybersecurity at: http…
  continue reading
 
Inside the resurgence of ransomware attacks and the rise of billion-dollar "unicorn" hacker gangs. Believe it or not, there was a time in recent history when we actually experienced a reprieve in ransomware attacks. According to a report from Black Kite, a leading provider of third-party risk management and cyber intelligence, a number of factors c…
  continue reading
 
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. FortiGaurd Labs encounters a kernel driver that makes use of the open-source donut tool. Checkpoint researchers observe Iranian threat actor Agrius operating against Israeli targets. SentielOne notes change…
  continue reading
 
Cyber News: Gigabyte Motherboard Backdoor, Toyota Breach Again, Zyxel Active Exploit & More Cyber News Cybersecurity News CyberHub Podcast June 1st, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards Toyota finds more misconfigured servers leakin…
  continue reading
 
All links and images for this episode can be found on CISO Series. What do we need to do to fix our processes to truly reduce risk and vulnerabilities? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our spons…
  continue reading
 
The war in Ukraine is approaching a pivotal moment. Russia remains in control of the hotly contested city of Bakhmut. But the ruthlessly effective mercenary forces of the Wagner Group—the same group whose leader, Yevgeny Prighozin, has openly bickered with the regular Russian military and reportedly offered to trade Russian troop positions to Ukrai…
  continue reading
 
Toyota finds more cloud leaks Gigabyte firmware update system insecure Twitter expands Community Notes to images Thanks to today's episode sponsor, Barricade Cyber Solutions Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped thousands of customers in situations just like yours. Their proprietary ransomw…
  continue reading
 
ChatGPT hallucinations cause turbulence in court, a riot in Wales may have been ignited on social media, and do you think .MOV is a good top-level domain for "a website that moves you"? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, …
  continue reading
 
SeroXen is a new elusive evolution of the Quasar RAT that seems to live up to its hype, and DogeRAT is a cheap Trojan targeting Indian Android users. Salesforce ghost sites see abuse by malicious actors. A look into identity security trends. People may be overconfident in their ability to detect deepfakes. Deepen Desai from Zscaler describes a camp…
  continue reading
 
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine n…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-gripping-tale-of-soc-2-certification. The story of AcmeCorp and its SOC 2 certification Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #saas-startups, #startups, #soc-2,…
  continue reading
 
Cyber News: MacOS SIP Bypass, Barracuda zeroday, WordPress Force Patch, CosmicEnergy Malware & More Cybersecurity News CyberHub Podcast May 31st, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: Critical Apple macOS Vulnerability Allowing SIP Protection Bypass WordPress force installs critical Jetpack patch on 5 million …
  continue reading
 
Episode 301 kicks off with Wired article exposes the China-backed Volt Typhoon Hack, a menacing cyberattack that poses a severe threat to critical infrastructure in the United States. With a specific focus on Guam's power grid control systems, this breach underscores the vulnerability and potential ramifications of such targeted attacks, Moving to …
  continue reading
 
China's Volt Typhoon snoops into US infrastructure, with special attention to Guam. Is CosmicEnergy just red-teaming, or is it a threat straight out of Red Square? Siemens patches a vulnerability endemic to the energy sector. An update on the Vulkan Papers. A cyberattack leads Suzuki to shut down its Indian production line. BlackBasta conducts rans…
  continue reading
 
On Sunday, May 28, Turkey held a bitterly contested run-off election, with incumbent presidential candidate Recep Tayyip Erdoğan winning reelection against opposition candidate Kemal Kılıçdaroğlu. Lawfare Legal Fellow Saraphin Dhanani sat down with Soli Özel, Senior Lecturer at Kadir Has University in Istanbul and a columnist at Habertürk daily new…
  continue reading
 
Leading experts warn of a risk of extinction from AI Hackers demand $3 million from Scandinavian Airlines Theranos founder turns herself in for 11-year prison term Thanks to today's episode sponsor, Barricade Cyber Solutions Have you fallen victim to a ransomware attack? Don't worry! Barricade Cyber Solutions has helped thousands of customers in si…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service