show episodes
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
I
ITSPmagazine
Series avatar that links to series pageSeries avatar that links to series page

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
  continue reading
 
G
Grumpy Old Geeks
Series avatar that links to series pageSeries avatar that links to series page

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

Unsubscribe
Unsubscribe
Weekly
 
As one of the longest-running podcasts, "Grumpy Old Geeks" discovers what went wrong on the Internet, and who's to blame. Every week they cut through the BS from big tech and tell you what's really going on. With wide-ranging topics, this show has something for everyone. There is a reason Elon Musk, Mark Zuckerberg, and that crowd all hate this podcast. Listen and find out for yourself!
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
S
Smashing Security
Series avatar that links to series pageSeries avatar that links to series page

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
  continue reading
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
  continue reading
 
w
web3 with a16z crypto
Series avatar that links to series pageSeries avatar that links to series page

1
web3 with a16z crypto

a16z crypto, Sonal Chokshi, Chris Dixon

Unsubscribe
Unsubscribe
Monthly
 
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users -- whether artists, coders, creators, developers, companies, organizations, or communities -- now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. Fro ...
  continue reading
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
C
Citizen Web3
Series avatar that links to series pageSeries avatar that links to series page

1
Citizen Web3

serejandmyself AKA Serj

Unsubscribe
Unsubscribe
Monthly+
 
Citizen Web3 provides infrastructure services as a validator across the blockchain space. It is one of the oldest web3 podcasts in the space and a community of like-minded people. Our flagship product (in the making): www.validatorinfo.com is a dashboard and an explorer that helps you to discover validators across the space. We believe in the power of decentralized communities and the potential of blockchains to build a better world. For us blockchains are not just digital technologies, but ...
  continue reading
 
M
Mostly Security
Series avatar that links to series pageSeries avatar that links to series page

1
Mostly Security

Jon King and Eric Wuehler

Unsubscribe
Unsubscribe
Weekly
 
Jon and Eric have worked in the security space as developers, architects and leaders for more years than they care to count. From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Strange tales of hacking, internet grifters, cybersecurity and tech with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder.
  continue reading
 
Long time internet marketer, looks at just released, fresh off the press internet marketing products - what works NOW! From wordpress plugins, software, ebooks, info on Clickbank, Adsense, Adwords, Blogging, Affiliate Marketing, Email Marketing, Local Business Services. Find out more at: https://linktr.ee/marketingsharks
  continue reading
 
Welcome to the Ten Golden Rules Internet Marketing for Law Firms Podcast. Join host Jay Berkowitz on an innovative journey through the world of digital marketing for the legal industry. With his expertise and passion, and world-class guests, Jay empowers legal professionals to thrive in the digital age. Explore topics like Search Engine Optimization, Google advertising, Artificial intelligence, intake strategies, content marketing, and social media strategies. Jay’s practical advice and indu ...
  continue reading
 
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come."The Linux ...
  continue reading
 
Unspoken Security by ZeroFox is a raw and gritty podcast for cybersecurity professionals who are looking to understand how the internet is being leveraged by threat actors. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share practical insights, and address the blunt truths surrounding cybersecurity. Ultimately, the lessons learned will enable security professionals to take an intel-driven, proactive approach to physical and cybersecurity th ...
  continue reading
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Want to stay up to date with the latest in the data privacy world? Hear from thought leaders about US and International privacy regulations, learn from privacy operations experts about building your privacy program or structuring your privacy engineering approach as well as other hot topics in the space. To learn more about WireWheel Data Privacy Management solutions, visit www.wirewheel.io.
  continue reading
 
Loading …
show series
 
UEFI Exploit via Boot Image https://binarly.io/posts/The_Far_Reaching_Consequences_of_LogoFAIL/index.html Fake Phishing Scan Tricks Users into Installing Backdoor Plugin https://www.wordfence.com/blog/2023/12/psa-fake-cve-2023-45124-phishing-scam-tricks-users-into-installing-backdoor-plugin/ Qlik Sense Exploited by Cactus Ransomware https://arcticw…
  continue reading
 
LogoFail; Fake WordPress Exploit; Qlik Sense Exploited; VMWare Patch UEFI Exploit via Boot Image https://binarly.io/posts/The_Far_Reaching_Consequences_of_LogoFAIL/index.html Fake Phishing Scan Tricks Users into Installing Backdoor Plugin https://www.wordfence.com/blog/2023/12/psa-fake-cve-2023-45124-phishing-scam-tricks-users-into-installing-backd…
  continue reading
 
Guest: Tyler Cohen Wood, CEO and Co-Founder Dark Cryptonite | Keynote Speaker | 2023 Top 30 Women in #AI | Cyber Woman of the Year Finalist 2021 and 2023 | Top 50 Global #Cybersecurity | Board Member | Fmr DIA Cyber Deputy Division Chief On LinkedIn | https://www.linkedin.com/in/tylercohen78/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.i…
  continue reading
 
This podcast episode features a discussion between Jay Berkowitz and guest, Michael Coopersmith from Integrated Technology Systems, about Law Firm technology best practices and cybersecurity. Michael, an IT veteran in the legal sector, shares his experience and how it has evolved from simply keeping technologies running to securing them from ransom…
  continue reading
 
Join us on an inspiring adventure through the world of cybersecurity, as we share a cup of digital coffee with our guest, Emily Austin, a seasoned professional in the tech field. Prepare to be enlightened and intrigued by her unlikely journey into the world of cybersecurity, a detour from psychology to tech that not only shows there's no single pat…
  continue reading
 
NexaVault AI – NexaVault AI - Secure Data Management - (marketingsharks.com) Lightning-Fast Media Storage, Intelligent File Management, and Instant Data Retrieval NexaVault AI Review, Bonus, OTOs – 2-in-1 SSD Cloud Powerhouse, Delivering Lightning-Fast Media Storage, Intelligent File Management, and Instant Data Retrieval NexaVault AI Nexa Vault AI…
  continue reading
 
Your online account credentials have two parts: a user name and a password. Today, most online providers force you to use your email address for your user name. This gives the service provider a guaranteed way to contact (and spam) their users, but it also means that bad guys know half of all your credentials and data brokers have a unique ID to tr…
  continue reading
 
Are you prepared to redefine your approach to securing the public cloud? Join us for an enlightening discussion with Jeff, an InfoSec veteran, where we unravel the intricacies of securing public cloud-native platforms. As we step into Jeff's career of over two decades, we explore the world of cloud security and emphasize the role of cloud providers…
  continue reading
 
Eric travels for Thanksgiving and Jon goes there and back again. Adversarial ML against LLMs, whether generated code is secure (it's not), the demise of a Crypto Drainer, and a complaint against Meta's new policy of pay-us-so-we-don't-track-you. For fun we have the California Railroad Museum and a video explaining just how Apple's Thunderbolt 4 USB…
  continue reading
 
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes In the 1960s, s…
  continue reading
 
In "Cybersecurity 2050: A Collective Odyssey into a Secure Future," we explore the transformative journey of cybersecurity from its nascent stages to a robust, interconnected landscape in 2050. Join us as we investigate the integration of advanced technologies like AI, quantum computing, IoT, and biometric systems with an open cybersecurity model. …
  continue reading
 
Unsubscribe season; Unwrapped & unpaid; Q-bot; META's all for the kids; stealing page views with AI; the coming change in the web; Boring; Ronaldo NFT lawsuit; pink slip season appetizers; DevTernity female cos-play; death at Amazon; Moscow's criminal wanted list adds Andy Stone; locked out of Google; as the TwiX turns; Mr. Free Speech; The Crown; …
  continue reading
 
Your posts matter more than you think. Social media has changed the way wars are fought and the internet has become a new battlefield. Twitter may be dying, but it still matters an awful lot to policy makers. TikTok is ascendent, but often because its content can be repurposed on other platforms. Telegram can give you the news on the ground, but on…
  continue reading
 
Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Introduction Cybersecurit…
  continue reading
 
Scott bought a Flipper Zero and was too lazy to watch YouTube so we've got Youtuber The Talking Sasquatch (https://www.youtube.com/@TalkingSasquach) joining us today to talk through the hardware hacking device, its past and some of the ethical boundaries of being a content creator! Learn more about your ad choices. Visit podcastchoices.com/adchoice…
  continue reading
 
Apple Updates https://isc.sans.edu/diary/Apple+Patches+Exploited+WebKit+Vulnerabilitiues+in+iOSiPadOSmacOS/30444 Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today https://isc.sans.edu/forums/diary/Prophetic+Post+by+Intern+on+CVE20231389+Foreshadows+Mirai+Botnet+Expansion+Today/30442/ Zyxel Vulnerabilities https://ww…
  continue reading
 
Apple Updates; Mirai Expansion; Zyxel Vulns; Solarwinds Update; DNS Looking Glass Apple Updates https://isc.sans.edu/diary/Apple+Patches+Exploited+WebKit+Vulnerabilitiues+in+iOSiPadOSmacOS/30444 Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today https://isc.sans.edu/forums/diary/Prophetic+Post+by+Intern+on+CVE2023138…
  continue reading
 
This episode of the #citizenweb3 podcast features Isaac Zarb, CTO and co- founder of Simply Staking Simply Staking aims to offer self-managed, self-owned, secure. They also say that they are a Tier 3 data centre with immediate onsite access without the need for 3rd party or public cloud providers. They claim to offer maximum privacy and security, e…
  continue reading
 
The Chrome browser just got another update with security patches for serious vulnerabilities. A new Bluetooth vulnerability has been discovered that could allow hackers to listen in on your personal audio. And how much personal information are you actually transmitting when you share your contact info using Apple's Name Drop feature? Show Notes: Go…
  continue reading
 
Decoding the Patterns: Analzying DShield Honeypot Activity https://isc.sans.edu/diary/Decoding%20the%20Patterns%3A%20Analyzing%20DShield%20Honeypot%20Activity%20%5BGuest%20Diary%5D/30428 Arcserve Unified Data Protection Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2023-37 Hikvision Vulnerabilities https://www.hikvision.com…
  continue reading
 
Guests: Shawn Butler, Co-Founder / VP - Architecture & Analytics at BNS UEP [@bnsuep1] On LinkedIn | https://www.linkedin.com/in/1kindword/ Kika Von Klück, VP - Research and Innovation at BNS UEP [@bnsuep1] On Linkedin | https://www.linkedin.com/in/kikavonkluck/ ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPma…
  continue reading
 
3 Months Honeypot Summary; Arcserver PoC; Hikvision Vuln; Custom GPT Vuln Decoding the Patterns: Analzying DShield Honeypot Activity https://isc.sans.edu/diary/Decoding%20the%20Patterns%3A%20Analyzing%20DShield%20Honeypot%20Activity%20%5BGuest%20Diary%5D/30428 Arcserve Unified Data Protection Multiple Vulnerabilities https://www.tenable.com/securit…
  continue reading
 
Don't minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carol…
  continue reading
 
Guest: Drew Ryder Smith, Artist/Songwriter On Twitter | https://twitter.com/drewrydersmith On Facebook | https://facebook.com/drewrydersmith On TikTok | https://tiktok.com/drewrydersmith On Instagram | https://instagram.com/drewrydersmith On YouTube | https://youtube.com/drewrydersmith _____________________________ Host: Marco Ciappelli, Co-Founder…
  continue reading
 
Pro-Russian Attackers Scanning for Sharepoint Servers to Exploit CVE-2023-29357 https://isc.sans.edu/diary/Pro%20Russian%20Attackers%20Scanning%20for%20Sharepoint%20Servers%20to%20Exploit%20CVE-2023-29357/30436 Microsoft Deprecates Microsoft Defender Application Guard for Office https://learn.microsoft.com/en-us/windows/whats-new/deprecated-feature…
  continue reading
 
Sharepoint Attack; MSFT removes Defender App Guard for Office; Synology , Tomcat and Chrome Vuln; Pro-Russian Attackers Scanning for Sharepoint Servers to Exploit CVE-2023-29357 https://isc.sans.edu/diary/Pro%20Russian%20Attackers%20Scanning%20for%20Sharepoint%20Servers%20to%20Exploit%20CVE-2023-29357/30436 Microsoft Deprecates Microsoft Defender A…
  continue reading
 
Loading …

Quick Reference Guide