Best Infosec podcasts we could find (Updated March 2019)
Related podcasts: Security Software Development Cybersecurity Cyber Hacking Tech Privacy Technology Cyberwarfare Computer Security Cybercrime Informationsecurity Information Business News Information Security Internet Computer Management Web  
Infosec public [search 0]
×
Join millions of Player FM users today to get Infosec news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
Information Security is the name of the game. Don't let the hackers win!
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
Security In 5 podcast brings you security news, tips, opinions in the area of Information, IT and general security...all in about five minutes. Easy to listen to, easy to understand and adding awareness to help you strengthen your personal and business security posture. Be aware, be secure.
 
7
7 Minute Security
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
R
Risk & Repeat
Monthly+
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
T
The GDPR Guy
Rare
 
Information, insights and inspiration on the GDPR General Data Protection Regulation
 
Bring Your Own Security Radio is hosted by Dave The IT Guy, CISSP, CEH and MCSE who brings you both the people behind the scenes securing systems from the bad guys, and some of the vendors who bring some of the hardware and software used to help secure an environment. Each episode is one hour in length, and often can provide you one CPE/CEU for your tech certifications simply for listening.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Security Conversations is a podcast series curated by award-winning security journalist Ryan Naraine. These in-depth interviews cover a wide range of top-of-mind issues, including threat intel, zero trust, security cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted threat activity.
 
Security. Some assembly required. Security is HARD, and 'real security' is a compromise between usability and security while knowing you're still accepting risk. This podcast alternates between interesting interviews and news analysis every other week - tune in, subscribe and join the conversation on REAL security issues relevant to your enterprise. Follow us on Twitter: @DtSR_Podcast Check out Rafal's SecurityWeek column: http://www.securityweek.com/authors/rafal-los
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
News you can use about cyber security.
 
E
EurotrashSecurity
Rare
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
The Liquidmatrix Security Digest Podcast. Learn more at http://www.liquidmatrix.org/blog/podcast
 
Information Security, Threat Intelligence, and all the Cybers - With Javvad Malik and Scot Terban. @J4vv4D @krypt3ia
 
I
I Want to Hack
Monthly
 
I Want to Hack documents Eamonn's journey into the field of information security. Starting from a cursory knowledge of all things tech, Eamonn is following a newound intrigue into the world of cyber security. Who doesn't want to learn how to hack?
 
S
SecuraBit
Rare
 
Before It Bytes!
 
Loading …
show series
 
Today's episode is the thrilling, exciting, heart-pounding conclusion of Tales of Internal Pentest Pwnage - Part 1. In this episode, we cover the final "wins" that got me to Domain Admin status (and beyond!): Got DA but can't get to your final "crown jewels" destinations? How about going after the organization's backups (evil grin!) Got DA but ...…
 
In today’s podcast, we hear that the US Attorney General has reported to Congress the results of Special Counsel Mueller’s investigation. The basic finding is that there’s no evidence of collusion with Russian influence operations. ISIS no longer holds any ground. Expect it back in cyberspace. LockerGoga ransomware hits two chemical plants. FEM ...…
 
MySpace, the once dominating social network on the Internet, confessed to a big goof. This epsiodetalks about what happened and why you shouldn't depend on online storage services. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,…
 
We just learned that we’re paying too much for our DigitalOcean servers. Unfortunately there’s no simple fix. These are authoritative DNS servers for section9.us. We can’t just delete them and create new, cheaper versions. Changes to complex, interconnected systems require a bit of planning. LINKS 1. Domain Name System - Wikipedia 2. Name Serve ...…
 
Log-MD story SeaSec East meetup Gabe (county Infosec guy) https://www.sammamish.us/government/departments/information-technology/ransomware-attack-information-hub/ New Slack Moderator (@cherokeeJB) Shoutout to “Jerry G” Mike P on Slack: https://www.eventbrite.com/e/adversary-tactics-red-team-operations-training-course-dc-april-2019-tickets-5473 ...…
 
FEMA hacked: Anonymous hacks US server in defense of Snowden, Sacked IT guy annihilates 23 of his ex-employer’s AWS servers, Microsoft Announces Windows Defender ATP Antivirus for Mac, PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws, and Facebook Stored Millions of Passwords in Plaintext—Change Yours Now.…
 
Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat. John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings. The ori ...…
 
In today’s podcast, we hear that Finland’s data protection authority is investigating reports that Nokia 7 Plus smartphones are sending data to a Chinese telecom server. Thousands of API tokens and cryptographic keys are exposed in public GitHub repositories. The US government warns that certain cardiac devices can be hacked from close range. A ...…
 
Buckle up! This is one of my favorite episodes. Today I'm kicking off a two-part series that walks you through a narrative of a recent internal pentest I worked on. I was able to get to Domain Admin status and see the "crown jewels" data, so I thought this would be a fun and informative narrative to share. Below are some highlights of topics/to ...…
 
This week's 'Risk & Repeat' podcast looks back at RSA Conference and discusses the show's diversity and inclusion efforts as well as the top trends and sessions from the show.By Rob Wright.
 
Mozilla continues their push to provide services for user's security and privacy protections. Thie tools, tips and tricks episode talks about Firefox Send. An end-to-end encrypted file transfer service. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iH ...…
 
Fancy Bear and Sandworm are launching cyberespionage campaigns against European governments before the EU parliamentary elections. The FIN7 cybercrime group is still active, and it’s using new malware. A scammer stole more than $100 million from Google and Facebook. Facebook stored hundreds of millions of passwords in plaintext for years. And c ...…
 
A recent study of security apps from the Google App store showed many are worthless. This episode talks about the report and tips one which ones you should use. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,…
 
Online drug dealers get busted due to poor OPSEC! People are still failing to wipe their USB sticks properly! A potential presidential candidate is outed as a former hacker! Flat Earthers! Pi! Empathy! All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley an ...…
 
Online drug dealers get busted due to poor OPSEC! People are still failing to wipe their USB sticks properly! A potential presidential candidate is outed as a former hacker! Flat Earthers! Pi! Empathy! All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley an ...…
 
In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scr ...…
 
A huge trove of medical records and prescriptions found exposed, How Hackers Pulled Off a $20 Million Mexican Bank Heist, Nasty WinRAR bug is being actively exploited to install hard-to-detect malware, Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web, and Two-thirds of all Android antivirus apps are frauds.…
 
A password vault is one of the easiest tools to greatly improve your security and safety for your accounts and data. Not everyone can or wants to invest money in one. This episode talks about the best free offerings for password managers. 10 Best Password Managers. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blo ...…
 
In this week’s show Patrick Gray and Alex Stamos discuss the week’s news, as well as discussing the rise of white supremacist communities and propaganda on the Internet and what can be done about it. News: Norsk Hydro ransomwared Huawei ban gets more and more political APT40 hitting USA hard Cyber Command’s Euro road-trip Kremlin interference i ...…
 
In today’s podcast, we hear that an aluminum manufacturing giant in Norway has suffered a major ransomware attack. A new version of the Mirai botnet malware is targeting enterprise systems. The US Homeland Security Secretary says the private sector and the government in the United States need to work together against cyber threats. Europol has ...…
 
OWASP is far more than the popular Top 10. This epsiode talks about the OWASP Application Security Verification Standard and a listener project that created a score card for your applications. OWASP Project Page. Scorecard GIT page. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Pod ...…
 
Nude selfies. This episode is all about nude selfies. What happens if you take one and give it to a vengeful boyfriend. What happens when a hacker knows you have them and wants to steal them from your phone. What happens is not good. This episode was sponsored by Nord VPN. Visit nordvpn.com/darknet and use promo code "DARKNET". This episode was ...…
 
This week, part 2 of a four-episode set recorded live from RSA Conference 2019. This time, it's Phil Beyer's turn to have a turn at the microphone... Highlights from this week's show include... Phil talks up "The failure of risk management" We discuss the realities of risk management Raf asks "How do we make more informed risk decisions?" Raf a ...…
 
In today’s podcast we hear about content moderation in the aftermath of the New Zealand mosque shootings. A shift in Huawei’s strategy in the face of Five Eye--and especially US--sanctions: the US doesn’t like us because we’re a threat to their ability to conduct untrammeled surveillance. Corruption, neglect, and replacement of experts by polit ...…
 
Artificial intellegence and machine learning isn't smart out of the box. Like any learning the more data it takes in the smarter it cam be. The internet has all the data any machine learning could want. However, creator of those machines can't just go around taking what they want. This episode talks about IBM doing just that. Check to see if yo ...…
 
Shout-out to Thomas… Tried to meetup while at SEA comic-con Patreon Log-MD Hacker’s Health - Ms. Roddie is at TROOPERS (Ms. Berlin?) 4 podcasts? SpecterOps Training / workshopCon - https://www.workshopcon.com/events Zach Ruble- @sendrublez C2 infra using Public WebApps TARCE - Teaching Assistant RCE(?) - they run your code every week, don’t che ...…
 
Time to start our own business, or at least give it a try. Dorothy & I talk about building services and solutions around the first three critical security controls. This includes possible solutions for hardware inventory, software inventory, vulnerability management and patch management. LINKS 1. Nessus 2. Nmap 3. LanSweeper 4. PDQ Inventory 5. ...…
 
Georgia county pays a whopping $400,000 to get rid of a ransomware infection, Russia internet freedom: Thousands protest against cyber-security bill, Gaming industry still in the scope of attackers in Asia, Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data and Telegram Gained 3 Million New Users During WhatsApp, Facebook Outage.…
 
Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework. The original research can be found here: https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html The ...…
 
In today’s podcast, we hear that a terror attack against two New Zealand mosques is announced on Twitter and live-streamed on Facebook. A new, unobtrusive JavaScript sniffer infests some e-commerce sites in the UK and the US. Cryptojacking finds its way into the cloud. A look at the consequences of regulation, both good and bad. How CISOs will ...…
 
This week's tools, tips and tricks talk about the Microsoft Security Compliance Toolkit. If you are a Windows owner, sys admin or interested in learning to secure Windows 10 and Windows servers this toolkit is for you. Download the toolkit. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In ...…
 
In today’s podcast, we hear that Indonesia says it’s got its voting security under control, and a lot of the problems sound like good old familiar fraud and dirty campaigning. Trustwave warns of a watering hole on a Pakistani government site. Recorded Future goes RAT hunting. Proofpoint offers a look at “intelligent brute-forcing.” Kaspersky re ...…
 
I recently had the awesome opportunity to take the awesome Real World Red Team course put on by Peter Kim, author of The Hacker Playbook series. TLDR and TLDR (too long don't listen): go take this training. Please. Now. The end. If you want to hear more, check out today's podcast episode where I talk about all the wonderful tidbits I learned fr ...…
 
Recently it was reported that Citrix was hacked by a state sponsored cyber criminal group. This hack was pulled off through a method called password spraying. This epsiode talks about the breach and what password spraying is. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Pa ...…
 
A $150 million mansion is hijacked online, Brits will soon have to scan their passport to watch internet porn, and are organisations right to pay up when hit by ransomware? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined th ...…
 
A $150 million mansion is hijacked online, Brits will soon have to scan their passport to watch internet porn, and are organisations right to pay up when hit by ransomware? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined th ...…
 
In today’s podcast, we hear that election interference concerns persist around the world. Governments seek to address them with a mix of threat intelligence and attention to security basics. A US Navy report says the Fleet’s supply chain is well on the way to being pwned by Chinese intelligence. Undersea cables are a center of Sino-US competiti ...…
 
Facebook once again takes a dip into security but slides in serious privacy violations to do it. This time in their two factor authentication offering they are using your phone number against you. This epsiode talks about the details of what they did and what you can't do as a user to protect against this. Be aware, be safe. *** Support the pod ...…
 
We're talking about how hyperconverged infrastructure can make a big difference in even small and medium sized businesses.
 
On this week’s show Adam Boileau and Patrick Gray discuss the week’s news: Chelsea Manning back in jail Citrix owned, Resecurity claims it was Iran. Again. Because reasons, apparently. Huawei politics get messy EXCLUSIVE: Toyota Oz, other carmakers likely targeted by APT32 (Vietnam) Much, much more This week’s sponsor is Senetas. They make laye ...…
 
In today’s podcast, we hear an update on Venezuela and its power outages. Amplification of social media posts as a form of mass persuasion. A look at how control of the Internet has replaced control of the radio station as a move in civil war and coup or counter-coup planning. Asian game makers get backdoored out of China. Decryptors are out fo ...…
 
The music sharing app TikTok, formerly Music.ly, got hit with a huge fine for children data privacy violations. This episode goes over wy they got fined and what you and others need to know about parenting around these child focused apps. Be aware, be safe. COPPA Law *** Support the podcast with a cup of coffee *** - Binary Blogger Website Secu ...…
 
This week, in the first of a four-part "Live from RSA Conference 2019" series, Rafal interviews Deidre Diamond. Deidre knows a little something about cybersecurity talent having worked in the field most of her professional career. We discuss all kinds of interesting and relevant topics... Highlights from this week's show include... Deidre prese ...…
 
Log-MD story (quick one) (you’ll like this one, Mr. Boettcher) SeaSec East meetup "Gabe" https://www.sammamish.us/government/departments/information-technology/ransomware-attack-information-hub/ New Slack Moderator (@cherokeeJB) Shoutout to “Jerry G” Mike P on Slack: https://www.eventbrite.com/e/adversary-tactics-red-team-operations-training-co ...…
 
Venezuela sustains power outages, and the regime blames hackers and wreckers. The opposition says it’s all due to the regime’s corruption, incompetence, and neglect. Citrix loses business documents in what might have been an Iranian espionage operation. Huawei’s suit against the US gets some official cheering from Beijing. The US warns against ...…
 
If you use Google Chrome as your browser you need to update it immediately. This episode goes into the details and the urgency for this update. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,…
 
We take a look at the risk assessment process. What is a risk assessment? How Does it reduce risk? We’re using a NIST risk assessment process. It can be long and complicated. We also do a quick risk assessment on two factor authentication. Once you understand risk assessments, they don’t have to be long and complicated. Now that we know what so ...…
 
New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild, Firefox to add Tor Browser anti-fingerprinting technique called letterboxing, The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source, Rush University Medical Center reports patients' information, including social security numbers, exposed in data breach and ...…
 
Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools bei ...…
 
Google login Twitter login Classic login