Best Infosec Podcasts (2019)
Infosec public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
C
Cyber Work
Weekly
 
Join us in the fight against cybercrime with weekly conversations about cybersecurity skills, jobs and industry trends.
 
D
Darknet Diaries
ماهیانه
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
G
Getting Into Infosec
Monthly+
 
Entertaining stories of how others got into Information Security (aka cybsersecurity), their experiences, lessons learned, and advice about getting in. Join my newsletter.Listen for an "Easter Egg" in each show!If you're looking to break into infosec, I wrote a little guide! Check it out:“I purchased the kindle book last night and just finished it. It was a great “mini-mentoring” session, and I felt encouraged to persevere. I plan to listen to the podcasts regularly. As a woman getting into ...
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
h
humans-of-infosec
Monthly
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
S
Sysadministrivia
Monthly
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
D
Defense in Depth
Weekly
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
Some real world sysadmins give you the news, and chat about sysadminning in the industry.
 
T
ThugCrowd
Weekly
 
Join us every week for live discussions on hacking, phreaking, and everything that DOESNT SUCK in infosec!
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
A list of some of my favorite Infosec podcasts and other podcasts that I think are great.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
C
Cyber Speaks LIVE
Monthly+
 
Cyber Speaks LIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. Cyber Speaks LIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cybersp ...
 
M
Mornings With Mark
Weekly
 
Daily-ish (M--F) musings about security and privacy and how it impacts our communities. What questions should as technologists be asking as we build?Watch the show at https://4mn.ca/mwm-video
 
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
ITSPmagazine is free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live.Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, our team of cybersecurity experts explores the topics that matter the most: the human element and its symbiotic effect on the latest in technol ...
 
p
pod2112 Podcast
Månedlig+
 
The 2112 Group's CEO and Chief Analyst Larry Walsh, one of the most recognizable figures in the IT channel and infosec communities, leads thought-provoking discussions with expert guests on a wide range of technology and business topics including: cloud computing, information security, business analytics, the Internet of Things (IoT), and much more.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Information Security is the name of the game. Don't let the hackers win!
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
S
SecTools Podcast
Månedlig
 
Podcast by InfoSec Campus
 
D
Drunk Infosec
Monthly
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
7
7 Minute Security
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
B
Breach
Monthly
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
The Hurricane Labs InfoSec Podcast features the clashing of swords and witty banter about the latest security topics. Listen in as we discuss headlines, hacks, tech tips, Splunk stuff, and more!
 
I
Infosec Dojo
Monthly
 
Information Security Podcast
 
C
Cyentia Podcast
Monthly
 
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
 
Bring Your Own Security Radio is hosted by Dave The IT Guy, CISSP, CEH and MCSE who brings you both the people behind the scenes securing systems from the bad guys, and some of the vendors who bring some of the hardware and software used to help secure an environment. Each episode is one hour in length, and often can provide you one CPE/CEU for your tech certifications simply for listening.
 
Loading …
show series
 
A daily look at the relevant information security news from overnight. Episode 177 - 18 October 2019 The Dukes are back - https://www.bleepingcomputer.com/news/security/cozy-bear-russian-hackers-spotted-after-staying-undetected-for-years/ Samsung sucky bios - https://www.zdnet.com/article/samsung-admits-fingerprint-reader-flaw-promises-software ...…
 
Gerry and Brandon discus various methods for malware analysis, the infosec job market, and multifactor authentication. As always they end with One Cool Thing. Show Notes Resources: Malware Analysis https://app.any.run/ Infosec Job Market https://www.cyberseek.org/heatmap.html Black Hills Information Security – 5 Year Path: Success in Infosec FB ...…
 
In this fireside chat, Sean Martin discusses the profession of cybersecurity, past, present, and future with Dr. Ron Ross from the National Institute of Standards and Technology.The interview covered a myriad of topics, including Dr. Ross’ cybersecurity career with the Department of Defense, the Intelligence Community, and NIST; a retrospective ...…
 
https://www.csoonline.com/article/3441220/marriott-data-breach-faq-how-did-it-happen-and-what-was-the-impact.htmlBy Jerry Bell and Andrew Kalat.
 
Security researcher advocate Chloé Messdaghi, now vice president of strategy at Point3 Security, views cyber as a humanitarian issue. Through deploying tactics from her nonprofit experiences and graduate studies, Chloé seeks to challenge public misconceptions of the industry. In our latest episode, Chloé joined Humans of InfoSec to discuss her ...…
 
Summer was crazy, my day job is keeping me super busy, and I've been really mentally occupied lately dealing with kids, family, and school. I miss producing shows, and will be getting back into it, have some really good shows queued up. I've still active on Twitter when possible, so we can stay in touch there in between shows. Oh and by the way ...…
 
Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your ...…
 
Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your ...…
 
Two major security issues with popular smartphones this week. First the Samsung Galaxy S10 and then the Google Pixel 4. For the Galaxy, it's fingerprint reader currently accepts any fingerprint to unlock the device and authorized activities. While the Pixel does not require attention for facial recognition to unlock the device or authorize acti ...…
 
Eventually your small business will grow and you will need a professional voice phone system. Grasshopper is a virtualized phone system that can get you up and running quickly from any device you have, not tied to a cellular or desk phone. As a special offer to listeners you can get $50 off your order here - http://trygrasshopper.com/securityin ...…
 
The Tin Foil Hats Club returns for its sixth episode. In this edition Jenny chats with Quentin Taylor, the Bushtucker CISO, as a follow up to the grab bag episode (No. 111) with Stuart Coulson and Cary Hendricks. Listen in as preparedness, the Hunted TV show and ideas for survival from movies are all discussed. To follow Quentin on Twitter, cli ...…
 
Podcast: The Missing Cryptoqueen Episode: Episode 1: Dr Ruja Pub date: 2019-09-19 Dr Ruja promised financial revolution. And then, two years ago, she disappeared. Why? The podcast and artwork embedded on this page are from BBC Radio, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.…
 
Podcast: The Missing Cryptoqueen Episode: Episode 1: Dr Ruja Pub date: 2019-09-19 Dr Ruja promised financial revolution. And then, two years ago, she disappeared. Why? The podcast and artwork embedded on this page are from BBC Radio, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.…
 
Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds ...…
 
Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds ...…
 
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? For information regarding your data privacy, visit acast.com/privacy
 
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? For information regarding your data privacy, visit acast.com/privacy
 
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? For information regarding your data privacy, visit acast.com/privacy
 
October is Security Awareness Month and this epsiode talks about your security program's best line of defense, your employees. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In ...…
 
A daily look at the relevant information security news from overnight. Episode 176 - 17 October 2019 Malware WAV - https://www.bleepingcomputer.com/news/security/attackers-hide-backdoors-and-cryptominers-in-wav-audio-files/ Android PoC - https://www.zdnet.com/article/security-researcher-publishes-proof-of-concept-code-for-recent-android-zero-da ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cyber-defense-matrix/) A simple way to visualize your entire security program and all the tools that support it. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spa ...…
 
After a two-week hiatus from the podcast, Dave returns for the 114th installment of the Transatlantic Cable Podcast. We open the episode looking at the latest news on the Facebook front. Unlike most of our podcasts, the focus won’t be on privacy snafus, instead, we will look at the latest news with Facebook’s Libra. Following up on that, we hea ...…
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
It’s not every day that you get to spend time with the current president of an association alongside one of the original founders of that same association—especially when it was founded over 35 years ago and is still going strong!Well, this exact thing happened to us during the ISSA International Summit in Dallas, Texas. We were honored to be p ...…
 
The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And w ...…
 
The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And w ...…
 
A daily look at the relevant information security news from overnight. Episode 175 - 16 October 2019 Stolen cards stolen - https://arstechnica.com/information-technology/2019/10/data-for-a-whopping-26-million-stolen-payment-cards-leaked-in-hack-of-fraud-bazaar/ Checkm8 scam - https://www.bleepingcomputer.com/news/security/scammers-use-fake-chec ...…
 
Microsoft and The US National Institute of Standards and Technology (NIST) are partnering together on a new guide for Enterprise Patching Practices. This epsiode talks about the guide and why this is a good and unique move. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcas ...…
 
Show Notes: https://thugcrowd.com/notes/20191015.html
 
In part 2 of this At The Edge podcast, we continue to look at the state of cybersecurity in Europe with a deeper dive into Ireland.As John Durcan reviews organizations and examines their business ideas and supporting technology, he's seeing more companies tying in the security piece right from the beginning. Companies are finally grasping the c ...…
 
Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens ...…
 
Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens ...…
 
A daily look at the relevant information security news from overnight. Episode 174 - 15 October 2019 Pitney Bowes encrypted - https://www.zdnet.com/article/pitney-bowes-claims-customer-data-safe-following-malware-attack/ Alphabroder down - https://www.asicentral.com/news/newsletters/promogram/october-2019/alphabroder-suffers-ransomware-attack/ ...…
 
IoT Strikes again. This is a reminder that Google Home devices through Google Assistant will remember everything about you unless you review, purge or stop it altogether. This epsiode goes through the steps to do. Source: https://www.cnet.com/how-to/google-assistant-will-remember-everything-forever-unless-you-tell-it-when-to-stop/ Be aware, be ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/rated-1-in-irresponsible-security-journalism/) No security alert is too small for us to completely misrepresent its severity. The sky is falling on the latest episode of CISO/Security Vendor Relationship Podcast. Thanks to this week's podcast sponsor, Zix. ...…
 
In this episode we meet Elliot Alderson (@fs0c131y) from Twitter. Who is this strange masked person? What adventures have they gotten themselves into? Many stories will be told. The mask will be lifted. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if so ...…
 
In this episode we meet Elliot Alderson (@fs0c131y) from Twitter. Who is this strange masked person? What adventures have they gotten themselves into? Many stories will be told. The mask will be lifted. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if so ...…
 
A daily look at the relevant information security news from overnight. Episode 173 - 14 October 2019 Nitro PDF flaw - https://www.bleepingcomputer.com/news/security/nitro-pdf-pro-to-get-micropatches-for-7-potential-rce-bugs/ Fin7 active - https://threatpost.com/fin7-retools/149117/ Hookers hacked - https://www.technadu.com/hookers-nl-forum-hack ...…
 
IoT Strikes Again! This episode is about the risks of relying on vendors to do the right thing with their products. A serious vulnerability has been published around some older D-Link Home Internet routers, however D-Link is not going to patch it leaving your device open and vulnerable. Listen for the details and what you should do about other ...…
 
Dave Farrow, Senior Director of Information Security at Barracuda Networks, and Cyber Work host Chris Sienko discuss Farrow's unconventional career journey, how engineering plays into cybersecurity and how to make lateral moves to transition careers.Additional Resources– View the transcript, additional episodes and promotional offers: https://w ...…
 
We talk about the (software) tools we tend to use in our everyday roles. (Full shownotes at http://sysadministrivia.com/episodes/S4E17)By admin@sysadministrivia.com (r00t^2).
 
By Marco Ciappelli & Sean MartinI have been talking with so many people, for so long, about this new Talk Show that it almost feels like it is old news. By this, I do not mean that I am bored with it—quite the opposite—I mean that is it has become familiar and part of the core conversations we aim to have on ITSPmagazine. As a matter of fact, o ...…
 
Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. Links to the research and Mich ...…
 
Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. Links to the research and Mich ...…
 
In this episode I talk about some things I learned about making your own kick-butt cred-capturing phishing campaign and how to do so on the (relatively) quick and (relatively) cheap! These tips include: Consider this list of top 9 phishing simulators. Check out GoPhish! Then spin up a free tier Kali AWS box Follow the instructions to install Go ...…
 
BitPaymer ransomware is exploiting an Apple zero-day. “Attor” isn’t your ordinary malign faerie: it’s also an espionage platform that’s been carefully deployed against Russian and Eastern European targets. FIN7 upgrades its toolkit. Apple does what the Chinese government asks it to do, blocking a mapping and a news app from users in China. And ...…
 
BitPaymer ransomware is exploiting an Apple zero-day. “Attor” isn’t your ordinary malign faerie: it’s also an espionage platform that’s been carefully deployed against Russian and Eastern European targets. FIN7 upgrades its toolkit. Apple does what the Chinese government asks it to do, blocking a mapping and a news app from users in China. And ...…
 
A daily look at the relevant information security news from overnight. Episode 172 - 11 October 2019 Nemty decryptor - https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/ Apple zero-day - https://www.scmagazine.com/home/security-news/ransomware/bitpaymer-ransomware-attackers-exploit-apple-f ...…