show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

Unsubscribe
Unsubscribe
Weekly
 
As one of the longest-running podcasts, "Grumpy Old Geeks" discovers what went wrong on the Internet, and who's to blame. Every week they cut through the BS from big tech and tell you what's really going on. With wide-ranging topics, this show has something for everyone. There is a reason Elon Musk, Mark Zuckerberg, and that crowd all hate this podcast. Listen and find out for yourself!
  continue reading
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

Unsubscribe
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
ITSPmagazine Podcast Network

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork

1
The Cipher Podcast

Bill Bowman and others

Unsubscribe
Unsubscribe
Monthly+
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
  continue reading
 
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
  continue reading
 
Artwork
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork

1
The Bid Picture with Bidemi Ologunde

CHIP STORY Media & Rainmaker Podcasts

Unsubscribe
Unsubscribe
Weekly+
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork

1
Linux Guy Guru

Linux Guy Guru

Unsubscribe
Unsubscribe
Monthly
 
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come."The Linux ...
  continue reading
 
Brought to you by the Boys Club network, Too Online is a show where hosts Deana and Natasha brief each other on internet stories from the week. Think of this as your auditory FYP. From viral moments to online phenomena, digital subcultures to trending topics, they're 'too online' so you don't have to be. Send in your own internet story findings to hi@boysclub.vip.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

Unsubscribe
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Archive is an investigative documentary series hosted by Tommie Trelawny and Nicky Anderson. Following the success of The Interruption, listeners can expect another captivating story from Season Two: The World's Hardest Puzzle. In 2012, a mysterious organisation known as Cicada 3301 announced itself on the message board, 4chan. The cryptic post appeared online, seeking 'highly intelligent individuals.' What followed became known as the hardest puzzle on the internet. One that took players ac ...
  continue reading
 
Artwork

1
METAPHOR BY LIVEPLEX

Liveplex Marketing Team

Unsubscribe
Unsubscribe
Monthly
 
Our mission at Liveplex is to be the catalyst for transformation in the digital landscape. We empower enterprises with the tools and expertise needed to embrace Web 3.0 effortlessly. Through our APIs and services, we enable efficiency, data-driven decision-making, personalization, security, and trust, allowing our customers to not only thrive in the digital age but also lead with innovation. We are dedicated to enhancing customer experiences, helping businesses evolve, and shaping the future ...
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
-New Episodes Every Wednesday- Find out what takes to solve some of the world's seemingly impossible problems. In each episode, SEAL Team 6 veteran and "Cleared Hot" podcast host Andy Stumpf interviews a new "agent of change" who is enacting real change to understand the scope of their work, how it can be replicated, and the unimaginable stakes of their everyday lives. An IRONCLAD Original.
  continue reading
 
Loading …
show series
 
Live Patching DLLs with Python https://isc.sans.edu/diary/Live%20Patching%20DLLs%20with%20Python/31218 Global Protect Phishing https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html BlackByte Ransomware Update https://blog.talosintelligence.com/blackbyte-blends-tried-and-true-tradecraft-with-newly-discl…
  continue reading
 
Python DLL Patching; Global Protect Phishing; BlackByte Ransomware; Exposed AI Services; Detecting Lateral Movement @sans_edu @BriPwn Live Patching DLLs with Python https://isc.sans.edu/diary/Live%20Patching%20DLLs%20with%20Python/31218 Global Protect Phishing https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fak…
  continue reading
 
Vega-Lite With Kibana To Parse and Display IP Activity Over Time https://isc.sans.edu/diary/Vega-Lite%20with%20Kibana%20to%20Parse%20and%20Display%20IP%20Activity%20over%20Time/31210 Attack tool update impairs Windows computers https://news.sophos.com/en-us/2024/08/27/burnt-cigar-2/ Iran-based Cyber Actors Enabling Ransomware Attacks on US Organiza…
  continue reading
 
Critical Cyber Security Alerts: Major Vulnerabilities and Exploits Unveiled In today's episode of Cyber Security Today, host Jim Love discusses a series of alarming cyber security incidents. Topics include a sophisticated attack exploiting a zero-day vulnerability in a popular network management platform, critical patches from SonicWall and Google …
  continue reading
 
Safeguarding Your Identity: Essential Tools and Techniques This episode focuses on the increasing dangers of data breaches and the various steps individuals can take to protect their personal information. Highlighting the threats posed by data breaches and data brokers, the discussion provides detailed reviews of free resources such as OperationPri…
  continue reading
 
During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's pri…
  continue reading
 
From October 28, 2022: There's been a lot of discussion about whether Donald Trump should be indicted. Lately, that discussion has focused on the documents the FBI seized from Mar-a-lago or the Jan. 6 committee's revelations about his efforts to overturn the 2020 election. But what about his speech on the ellipse on Jan. 6 when he told a crowd of t…
  continue reading
 
Fourth times a charm. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss stealing login credentials with microphones, hacking courses for cybersecurity classes for instant grades, and parking pits. Hotline Hacked is brought to you by DeleteMe. Take control of your data and keep your private lif…
  continue reading
 
From October 30, 2020: Laura Rosenberger is the director of the Alliance for Securing Democracy and a senior fellow at the German Marshall Fund of the United States. She was foreign policy advisor for the Hillary Clinton campaign four years ago, where she had to respond to Russian information operations against the campaign in real time. She has be…
  continue reading
 
From January 8, 2021: The storming of the Capitol on Wednesday was a catastrophic failure of protective law enforcement, as rioters overran Capitol Police barricades and gained access to a building that a lot of police were supposed to be protecting. How did it happen? Who screwed up? And what can be done about it? Benjamin Wittes sat down with Fre…
  continue reading
 
Welcome to a special weekend edition of Cyber Security Today! In this long weekend episode, we delve into the world of artificial intelligence (AI) and its impact on various sectors, particularly as organizations ramp up their plans for the upcoming year. Join our host Jim Love and a distinguished panel of experts: Evgeny Koloda, Marcel Gagne, John…
  continue reading
 
Guest: ✨ Dr. Neal Baer, Co-Director, Master's Degree Program in Media, Medicine, and Health, Harvard Medical School On LinkedIn | https://www.linkedin.com/in/neal-baer/ On Twitter | https://x.com/NealBaer On Facebook | https://www.facebook.com/neal.baer.75/ On Instagram | https://www.instagram.com/nealbaer/ ____________________________ Host: Marco …
  continue reading
 
Guest: Rick DellaRatta, Founder, Jazz For Peace On LinkedIn | https://www.linkedin.com/in/rick-dellaratta-08199818/ On Twitter | https://twitter.com/jazzmgmt On Mastodon | https://twitter.com/jazzmgmt On Facebook | https://www.facebook.com/JazzforPeaceGrant/ On TikTok | https://www.facebook.com/JazzforPeaceGrant/ On Instagram | https://www.instagra…
  continue reading
 
Elliot Jones, a Senior Researcher at the Ada Lovelace Institute, joins Kevin Frazier, Assistant Professor at St. Thomas University College of Law and a Tarbell Fellow at Lawfare, to discuss a report he co-authored on the current state of efforts to test AI systems. The pair break down why evaluations, audits, and related assessments have become a k…
  continue reading
 
Hey, hey we're all Monkees; Waymo rides; Sober Outfitters; the cruel passage of time; Telegram CEO arrested in France; Zuckerberg's bizarre open letter; Uber slapped with a big Dutch fine; Tesla semi crash; tariffs on Chinese EVs; NFT artist sues the SEC; Google Ireland refused data center due to power grid; solar panels on self-storage rooftops; T…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love dives into the alarming rise of deepfake scams, highlighting how threat actors are using AI-generated videos to lure victims into fraudulent schemes. A notable campaign involves deepfake videos of Elon Musk promoting 'Quantum AI.' Additionally, the episode covers a sophisticated cyber attack whe…
  continue reading
 
Guest: Malcolm Harkins, Chief Security and Trust officer at HiddenLayer, former CISO at Intel, and fellow at the Institute for Critical Infrastructure Technology (ICIT) On LinkedIn | https://www.linkedin.com/in/malcolmharkins/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist…
  continue reading
 
This week, Quinta and Scott were joined by Lawfare Managing Editor Tyler "Spicy Tyler" McBrien to talk through the week's big national security news stories, including: “Jack Smith Takes a Mulligan on his Big Swing.” A grand jury has re-indicted former President Trump for his actions relating to the Jan. 6 insurrection, after Special Counsel Jack S…
  continue reading
 
Navigating Cybersecurity: Q&A Session with Marc In this special episode recorded outdoors, Marc answers listener questions about breaking into the cybersecurity field. Topics include gaining practical experience without an IT background, the importance of certifications, essential soft skills, networking strategies, handling job rejections, and mak…
  continue reading
 
Lawrence Gentilello, the co-founder and CEO of Optery talks about the growing scandal around breaches at data brokers that have exposed the sensitive data on hundreds of millions of Americans to cyber criminals and how firms like Optery are helping people fight back. The post Episode 258: Broken Brokers – Optery’s Fight To Claw Back... Read the who…
  continue reading
 
Lawrence Gentilello, the co-founder and CEO of Optery talks about the growing scandal around breaches at data brokers that have exposed the sensitive data on hundreds of millions of Americans to cyber criminals and how firms like Optery are helping people fight back. The post Episode 258: Broken Brokers – Optery’s Fight To Claw Back Your Personal D…
  continue reading
 
This episode of “Trump's Trials and Tribulations,” was recorded on August 28 in front of a live audience on YouTube and Zoom. Lawfare Editor-in-Chief Benjamin Wittes spoke to Lawfare Senior Editors Anna Bower, Quinta Jurecic, and Roger Parloff about Special Counsel Jack Smith’s superseding indictment against former President Trump in the Jan. 6 pro…
  continue reading
 
Apple announces the date of their September iPhone event. You should be aware that Apple ID is going to be called something different when Apple's new operating systems arrive. Some changes are also coming to Apple Care, and we have the details. And as usual, there's new Stealer malware to talk about this week. Show Notes: Apple Event - It's Glowti…
  continue reading
 
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Leah Morris, a fitness/yoga instructor and personal trainer (in-person & online). The conversation spanned a variety of topics, from the balance of motivation and discipline in fitness to navigating the complexities of social media. Leah shared her insights on creating saf…
  continue reading
 
Kibana Vega; EDR Killers; Iran Ransomware; Confluence Exploit; Fortra Vulnerability Vega-Lite With Kibana To Parse and Display IP Activity Over Time https://isc.sans.edu/diary/Vega-Lite%20with%20Kibana%20to%20Parse%20and%20Display%20IP%20Activity%20over%20Time/31210 Attack tool update impairs Windows computers https://news.sophos.com/en-us/2024/08/…
  continue reading
 
Today on Change Agents, Andy is joined by independent war journalist Matt ‘Willy’ Williams. He is an Australian military veteran who served in the Australian Infantry with the 7th Battalion Royal Australian Regiment from 2014-2021, and is a Queens Order of Australia Medal (OAM) recipient. A few months after returning from deployment as a crew comma…
  continue reading
 
On today’s episode, Vanda Felbab-Brown, Director of the Initiative on Nonstate Armed Actors, Co-Director of the Africa Security Initiative, and Senior Fellow in Foreign Policy at the Brookings Institution joins Lawfare Managing Editor Tyler McBrien to help make sense of the recent skirmishes in northern Mali between the junta, separatist groups, Is…
  continue reading
 
Why is Python so Popular to Infect Windows Hosts https://isc.sans.edu/diary/Why%20Is%20Python%20so%20Popular%20to%20Infect%20Windows%20Hosts%3F/31208 OFBiz Vulnerability Update https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://nvd.nist.gov/vuln/detail/CVE-2024-38856 Versa Directory Vulnerability Exploited https://versa-networks.c…
  continue reading
 
Guests: Fred Heiding, Research Fellow, Harvard On LinkedIn | https://www.linkedin.com/in/fheiding/ On Twitter | https://twitter.com/fredheiding On Mastodon | https://mastodon.social/@fredheiding On Instagram | https://www.instagram.com/fheiding/ Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast On IT…
  continue reading
 
Leadership wants to get on the AI bandwagon - what are the security risks? While at the Kansas City Developers Conference, Richard sat down with Steve Poole to talk about his experiences helping companies manage the risk of bringing AI into the company. Steve talks about the impact of introducing a new development stack, especially open-source stac…
  continue reading
 
Loading …

Quick Reference Guide