Data Hackers public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Artwork

1
The Civic Hacker Podcast

Lori McNeill, Founder | Civic Hacker Network

Unsubscribe
Unsubscribe
Monthly
 
Problems have solutions. We're here to learn about them from regular people creating change in their communities using data and technology. Each season of the Civic Hacker Podcast includes audio from the Civic Hacker Summit and news from the Civic Hacker Network. The Civic Hacker Podcast © 2023 by Lori McNeill is licensed under CC BY-NC-ND 4.0. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/
  continue reading
 
Artwork
 
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
  continue reading
 
Artwork

4
Surveillance Report

Techlore & The New Oil

Unsubscribe
Unsubscribe
Weekly+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Hacker Public Radio

Hacker Public Radio

Unsubscribe
Unsubscribe
Monthly
 
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
  continue reading
 
Artwork

1
Small Business Cybersecurity Podcast

Small Business Cybersecurity Podcast

Unsubscribe
Unsubscribe
Monthly
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
  continue reading
 
Artwork

1
The Map Hackers

The Map Hackers

Unsubscribe
Unsubscribe
Monthly
 
Each episode our panel of International Map Hackers will dissect a buzzword from the world of GIS. We’ll give you concrete definitions, practical applications, and share where we hope the technology can go from here.
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
  continue reading
 
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

Unsubscribe
Unsubscribe
Monthly
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
Artwork
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Artwork

1
InTechnology

Camille Morhardt

Unsubscribe
Unsubscribe
Weekly
 
Welcome to InTechnology, hosted by Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
The Cyber Brief Podcast

National Cybersecurity Center

Unsubscribe
Unsubscribe
Monthly
 
The CyberBrief Podcast uncovers the latest cyber attacks, hacks, and stories that matter. Cyber crimes are growing exponentially, with many of the latest attacks & hacks being the biggest in history and costing billions of dollars. But what can we as cyber professionals, business leaders, or just people living in a digital age do? In this series, we’ll dive into the history of cybersecurity, some of the top hacks and scams in cyber, and what we can do about it. To mark Cybersecurity Awarenes ...
  continue reading
 
Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.
  continue reading
 
Artwork
 
The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
Monthly+
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
  continue reading
 
“Unprecedented” is a biweekly podcast hosted by Law.com reporter Ben Hancock about technology, the law, and the future of litigation. Based in San Francisco, Ben writes about third-party litigation finance, legal data analytics, artificial intelligence, privacy, and related issues. Listen to more Law.com podcasts here.
  continue reading
 
Artwork
 
In-depth conversations with bootstrapped entrepreneurs building profitable internet businesses. Including both members and friends of the Ramen Club community. Ramen Club is building the community, content and tools supporting founders to ramen profitable, and beyond.
  continue reading
 
The speed of technological change continues to race ahead at breakneck speed, but it will never move this slowly again. In 2024, businesses and their employees will be expected to get to grips with AI, Machine Learning, Quantum Computing, Extended Reality, Cloud Computing, Edge Computing, Sustainable Tech, Green Computing, Cybersecurity, 5G, Blockchain, Crypto, IoT, Autonomous Everything, Human Augmentation, Data Sovereignty, Privacy, AI ethics and the Digital Transformation of everything. N ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Loading …
show series
 
Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market …
  continue reading
 
00:00 - PreShow Banter™ — BHIS Bees Corp® 04:08 - The FUTURE IS…… Kickstarter 05:29 - BHIS - Talkin’ Bout [infosec] News 2024-04-08 06:03 - Story # 1: New draft bipartisan US federal privacy bill unveiled 11:03 - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies 13:04 - Story # 2b: Request a Consumer Disclosure Repo…
  continue reading
 
Journalist Byron Tau sits down with host Elias Groll to discuss his eye-opening book about commercially available data. CyberScoop reporter Derek B. Johnson joins the show to discuss recent indictments and sanctions targeting Chinese hackers accused of surveilling politicians and dissidents.By Safe Mode Podcast
  continue reading
 
00:00 - PreShow Banter™ — A Parent Process 03:01 - BHIS - Talkin’ Bout [infosec] News 2024-04-22 04:13 - Story # 1: Exploit code for Palo Alto Networks zero-day now public 07:44 - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) 23:22 - Story # 2: MGM says FTC can’t…
  continue reading
 
In this episode, Jeffrey talks to JC Dodson, former CSO for BAE Systems and the founder of global risk, resilience, and response advisory firm JCarl Group. Jeffrey and JC discuss movies where characters are confronted with new and challenging situations, the evolution of supply chain security and the critical nature of presenting cyber risks as a b…
  continue reading
 
This is a long one! First Joseph previews his upcoming book, DARK WIRE. Go to the link below and enter "DW20" for 20% off! Also make sure to redeem your preorder behind-the-scenes bonus content. As for this week's stories, we start off with Jason explaining why we can, we must, dunk on the Humane Ai Pin, a piece of hardware that is AI's Juicero mom…
  continue reading
 
In today’s episode of The Daily Threat, we unravel the alarming realities of cyber intrusions affecting various sectors. From election manipulation to healthcare breaches and data breaches, the digital landscape is fraught with risks. Dive deep into the stories with us and learn how cyber adversaries are exploiting vulnerabilities and what you can …
  continue reading
 
In today's episode, we're joined by James Brundage from Ernst & Young to unravel the dynamic shifts and significant trends in the technology mergers and acquisitions sector for 2023. Why was technology singled out as the EY M&A Sector of the Year? Amidst a landscape marked by economic turbulence and evolving market demands, technology has not only …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/6-github-repos-for-devsecops-in-2024. These are the essential building blocks and tidbits that can help you arrange for a DevSec Ops experiment or build out your own program. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can al…
  continue reading
 
In this episode, Ron Eddings gets a chance to speak with Ayman Elsawah, Founder of Cloud Security Labs, and have him share his experience with becoming a vCISO. Ayman will break down the vast business of security consulting and help you determine the best approach and next steps to catalyze you on your way to owning your time and your own business.…
  continue reading
 
In today’s episode of The Daily Threat, we delve into the latest cybersecurity headlines shaking up the digital world! Discover how a massive breach rocked over 600,000 Roku accounts, prompting the enforcement of two-factor authentication (2FA). Learn about a clever yet malicious tactic involving GitHub comments, used to distribute malware via Micr…
  continue reading
 
In today's episode of Tech Talks Daily, we're joined by Scott Dodds, CEO of Ultima, a pioneering technology services provider and one of the first to gain early access to Microsoft Copilot. Scott shares his firsthand experiences with this transformative AI tool, providing valuable insights into how businesses can harness AI for automation and as a …
  continue reading
 
Eve Herold, author, "Robots and the People Who Love Them" Tomaš Dvořák - "Game Boy Tune" - Machinarium Soundtrack - "Mark's intro" - "Interview with Eve Herold" [0:03:33] - "Mark's comments" [0:40:46] Hurst & Ottsc - "Spameater" - Spameater [0:54:41]https://www.wfmu.org/playlists/shows/139154By Mark Hurst and WFMU
  continue reading
 
-In today’s episode of The Daily Threat, we uncover alarming cyber threats shaking the digital landscape. 🚨 Cybercriminals exploit trust with LastPass impersonation, Chinese hackers target critical US infrastructure, and deepfake videos pose risks to investors and CEOs. Stay informed to stay protected! #Cybersecurity #LastPass #ChineseHackers #Deep…
  continue reading
 
Episode 174: A new bot is selling your Discord content, DuckDuckGo has announced a new suite of privacy-protecting services, Proton & Standard Notes have joined forces, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00…
  continue reading
 
In this episode of InTechnology, Camille gets into hardware attacks with Maggie Jauregui, a hardware security researcher at Intel. They talk about Maggie’s “secret superpower” of joy rooted in her Latin American upbringing, her first hardware hacking experiment with a hairdryer, the physics of hardware hacking, iSTARE’s proactive research, the poss…
  continue reading
 
Are we standing on the brink of a technological revolution in commerce? Today, on Tech Talks Daily, we're joined by Ken Moore, Chief Innovation Officer at Mastercard, to delve into the company's "Emerging Technology Trends for 2024" report. This comprehensive analysis outlines the technological strides expected in AI, computing power, and data and …
  continue reading
 
Are you tired of feeling disconnected from your financial life? In today's episode, we dive deep into personal finance management with Sam Taylor, VP of Technology at Cleo, the AI assistant making waves in the financial sector. Sam brings a decade of experience leveraging AI and ML to enhance and personalize user experiences, especially economicall…
  continue reading
 
Are we overlooking the value of fintech in simplifying the complex, yet crucial aspects of financial services? In today's episode of Tech Talks Daily, we sit down with Aaron Holmes, CEO of Kani Payments, a company at the forefront of revolutionizing the financial services industry through their innovative reconciliation and reporting platform. Sinc…
  continue reading
 
Sure, here’s the YouTube description with the web links typed out word for word and hashtags included: In this episode of The Daily Threat, we delve into three major cybersecurity stories shaking up the industry: Microsoft Still Dominates Cybersecurity Business After Hacks Read more: https://www.bloomberg.com/news/newsletters/2024-04-17/microsoft-s…
  continue reading
 
Over half-a-million Roku accounts were compromised recently. We’ll look at what’s being done, and ways to keep your accounts safe. Plus - talk of a scary iPhone exploit that probably doesn’t exits. That’s all on Checklist No. 372, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Secu…
  continue reading
 
Are we truly prepared to defend our critical infrastructures against cyber threats? In today’s episode of Tech Talks Daily, we're joined by Irfan Shakeel, the VP of Training & Certification Services at OPSWAT, a pivotal player in cybersecurity for critical environments. OPSWAT has recently announced a commendable $10 million scholarship program aim…
  continue reading
 
Q&A172: Is F-Droid safe to use yet? Where else do we get our news? How should one pick a data removal service? This and more! Join our next Q&A on Patreon: https://www.patreon.com/posts/is-f-droid-safe-102620011 Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. ❤️ Suppor…
  continue reading
 
This week on Technado, we start off strong with some breaking news: geospatial intelligence firm Space-Eyes has allegedly been breached by IntelBroker. From there, we cover TWO 10.0 command injection vulnerabilities - one affecting Windows, one affecting Palo Alto. Apple has issued warnings to more than 90 countries concerning Mercenary spyware att…
  continue reading
 
Episode 67: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive on the topic of Vulnerability Disclosure Programs (VDPs) and whether they are beneficial or not. We also touch on the topic of leaderboard accuracy, and continue the Program VS Hacker debate regarding allocating funds for bounties. Follow us on twitter at: @ctbbpodcas…
  continue reading
 
The popular streaming service Roku was hit with its second data breach this year, and the info of hundreds of thousands of users was exposed. Another Google service has met its end, we'll tell you about the newest resident of the Google graveyard. And take a deep dive into how hackers use SIM swapping attacks and how you can stop them. Show Notes: …
  continue reading
 
In today’s episode of The Daily Threat, we delve into critical cybersecurity news stories that demand your attention! Learn about potential data exposure risks with AWS, Google, and Azure CLI tools, brute-force attacks targeting VPN services, and the alarming SIM swap scam hitting T-Mobile users. Stay informed and safeguard your digital assets! #Cy…
  continue reading
 
Are businesses truly prepared to integrate generative AI into their operations? In today's episode, we engage with Sanjay Jain, Chief Business Transformation Officer at WNS, to delve into a thought-provoking discussion based on a recent survey conducted by WNS and Everest Group. The survey sheds light on the readiness of various enterprises to adop…
  continue reading
 
At last August’s DEF CON computer security conference, more than 2,000 people tried their hands at breaking some of the world’s most advanced AI models. That event was the largest-ever public red-teaming event of large language models, and since then policymakers are continuing to look to red-teaming as a key tool in responsibly deploying AI system…
  continue reading
 
How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield. Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on…
  continue reading
 
00:00 - PreShow Banter™ — Retro Actions 04:48 - BHIS - Talkin’ Bout [infosec] News 2024-04-15 07:05 - Story # 1: FCC to vote on net neutrality rules on April 25 18:52 - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass 23:40 - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff 28…
  continue reading
 
We start this episode with Joseph's latest fly-on-the-wall investigation into the Com, the nebulous online entity and culture that is linked to some of the most high profile and brazen data breaches in recent history. Joseph sat in their chatrooms while rival hackers and criminals doxed and physically robbed one another. A true melding of digital a…
  continue reading
 
Join us for the latest episode of The Daily Threat as we delve into the world of cybersecurity warfare! 🔒 Microsoft takes action against email spam with new Exchange Online restrictions. Learn more: [https://www.bleepingcomputer.com/news/microsoft/microsoft-will-limit-exchange-online-bulk-emails-to-fight-spam/] 📧 #Microsoft #ExchangeOnline #Spam #C…
  continue reading
 
Are you curious how large firms integrate advanced technologies like AI into their operations effectively? In this episode of Tech Talks Daily, we sit down with James Osborn, Chief Digital Officer at KPMG UK, as he reflects on his first year in this pivotal role. James will share his insights on deploying KPMG's internal AI, dubbed Ava, and spearhe…
  continue reading
 
Loading …

Quick Reference Guide