Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
We Cover the Cyberspace.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
We do reviews of movies, series, shows and animation shows and film from streaming entertainment giant Netflix. Tune in to find out what's what, like what to watch and what not to watch! SPOILER ALERT! Check out our other show; https://theenglishgame.transistor.fm/
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Discussing all things tech and simplifying concepts for those new to tech.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Compelling conversations with Tech Industry leaders.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
The podcast by the Linux Mint community for all users of Linux
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
1
121. Mic Drop: A unusual peek inside a North Korean malware lab
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43
North Korea has a unique way of testing malware — they are less concerned about getting it right than getting it out… a kind of “smash-and-grab” approach to cyber attacks. Sentinel One’s Tom Hegel explains.By Recorded Future News
…
continue reading
1
CISA malware analysis, "hunt forward" missions, Spectre v2
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
CISA expands automated malware analysis US Cyber Command launched “hunt forward” missions Spectre v2: Linux Boogaloo CHECK OUT Capture the CISO season 2 here. Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks …
…
continue reading
First up in the news: Red Hat Announces Nova Graphics Driver for NVIDIA GPUs, Blender 4.1 released, MakuluLinux brings LinDoz back this time with AI, the end of EXT2 In security and privacy: Backdoor found in widely used Linux utility breaks encrypted SSH connections, Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices Then…
…
continue reading
1
Cyber Security Today, March 27, 2024 - A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from open source repositories
9:44
9:44
Play later
Play later
Lists
Like
Liked
9:44
This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet, and moreBy ITWC
…
continue reading
1
Configuration Manager Security Concerns! Apple Opens Talks with AI Vendors! Fujitsu Malware Breach!
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43
On this episode of the podcast, I cover several security related stories including an interesting study about Microsoft Configuration Manager security concerns, a recent admission from Fujitsu about a breach, an announcement from Microsoft on the next Office LTSC version and more!Reference Links:https://www.rorymon.com/blog/configuration-manager-se…
…
continue reading
1
Week in Review: Cisco MFA breach, Bad bots surge, Microsoft mail breach fallout
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday April 19, 2024
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departmentsBy Howard Solomon
…
continue reading
First up in the News: Mint Monthly News, Mint is testing new CDN setup for repositories, EndeavourOS ends ARM branch due to lack of help, Proton buys Standard Notes, Dynebolic portable Linux renewed after 10 year hiatus, APT 2.9 released, 3.0 announced In Security and Privacy: Over 92,000 DLink NAS devices exposed via backdoor, with no patch (out o…
…
continue reading
1
Cyber Security Today, April 19, 2024 - Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46
This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international, and moreBy Howard Solomon
…
continue reading
1
CYFIRMA Research - Ivanti RCE (CVE-2024-21894) Vulnerability Analysis and Exploitation
3:01
3:01
Play later
Play later
Lists
Like
Liked
3:01
A critical vulnerability, CVE-2024-21894, has been discovered in Ivanti's Connect Secure and Policy Secure gateways, posing a severe global threat to digital security. CYFIRMA’s research team have conducted a thorough analysis of this vulnerability. Immediate action is strongly advised: apply the latest patches provided by Ivanti to secure your sys…
…
continue reading
1
123. Mic Drop: China seeks a Great Leap Forward in cyber
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45
Chinese hackers are stepping up their game, according to Nigel Inkster, the former director of operations for Britain’s MI6. He says they are taking on a new swagger in cyberspace and borrowing things from a familiar playbook: a Russian one.By Recorded Future News
…
continue reading
1
LabHost police bust, Michigan healthcare attack, Windows Fibers vulnerability
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09
Police bust reveals sophisticated phishing-as-a-service platform Overlooked Windows Fibers offer handy route for malicious payload deployment Michigan healthcare organization suffers data breach Thanks to today's episode sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talk…
…
continue reading
1
Checklist 372 - A Roku Breach and a Doubtful Exploit
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10
Over half-a-million Roku accounts were compromised recently. We’ll look at what’s being done, and ways to keep your accounts safe. Plus - talk of a scary iPhone exploit that probably doesn’t exits. That’s all on Checklist No. 372, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Secu…
…
continue reading
1
Water utility threats, GPT-4 hacking, SIM swap solicitation
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
Sandworm-linked group tied to attack on water utilities GPT-4 reads security advisories Cell carrier workers solicited for SIM swaps Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from sharing your security posture and SOC 2 in a single port…
…
continue reading
1
CYFIRMA Research - Threat to Offshore Infrastructure in a Maritime-Centric Century
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00
The most important evolving threat to the electric grids is cyber threats and physical security. The power grid in the US and more so in Europe is experiencing a transformation, as the world shifts to sustainable energy, which entails increased reliance on offshore wind farms and undersea infrastructure that are going to supply large chunks of the …
…
continue reading
We start this episode with Joseph's latest fly-on-the-wall investigation into the Com, the nebulous online entity and culture that is linked to some of the most high profile and brazen data breaches in recent history. Joseph sat in their chatrooms while rival hackers and criminals doxed and physically robbed one another. A true melding of digital a…
…
continue reading
1
E188 | WOODY WOODPECKER GOES TO CAMP (movie review)
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09
After being expelled from the forest, Woody believes he has found a permanent home at Camp Woo Hoo. However, his hopes are dashed when an inspector threatens to close the camp unless Camp Woo Hoo triumphs in the annual survival game against Camp Woo Rah—a competition Camp Woo Hoo has never won..
…
continue reading
1
Cyber Security Today, April 17, 2024 - More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner, and more
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetingsBy Howard Solomon
…
continue reading
1
Cisco MFA breach, Bad Bots surge, LockBit 3.0 propagates
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38
Cisco announces breach of multifactor authentication message provider Bad bots drive 10% annual surge in account takeover attacks LockBit 3.0 variant generates custom, self-propagating malware Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sh…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
Mal is the manager of England's homeless football team, taking his players to Rome with the hope of being crowned champions of the Homeless World Cup. He brings with them a talented striker, Vinny, who could give them a real chance at winning.
…
continue reading
1
Threads out in Turkey, Palo Alto backdoor, Microsoft' security overhaul
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Meta to close Threads in Turkey Palo Alto fixes backdoor zero-day Details on Microsoft’s security overhaul Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on sales. As infosec teams become hands on in the sales cycle, proving your value becomes key. A director of GRC said la…
…
continue reading
1
122. The UK-US unmasked a giant Chinese cyber operation but forgot one thing: to tell many of its victims
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
The US and UK made a splashy coordinated announcement last month about a years-long cyber espionage campaign by Chinese state-backed hackers. The US indicted seven, the UK leveled sanctions. They just neglected to do one thing --- let some of the victims know.By Recorded Future News
…
continue reading
A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substac…
…
continue reading
1
Potential New VMware EUC Name! Cloud Provider Cost Cuts! New Citrix Deal!
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05
On this episode of the podcast, I cover a potential name change for VMware EUC, a new partnership deal for Citrix, multiple vulnerability disclosures for vulnerabilities with a 10 out of 10 on the severity scale and more!Reference Links:https://www.rorymon.com/blog/potential-new-vmware-euc-name-cloud-provider-cost-cuts-new-citrix-deal/…
…
continue reading
Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. …
…
continue reading
1
Cyber Security Today, April 15, 2024 - Act fast to a plug hole in Palo Alto Networks firewall, Canadian comedy festival loses over $800K in email scam, and more
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04
This episode reports on a new anti-ransomware strategy, and moreBy Howard Solomon
…
continue reading
1
Using Australian cyber regulation as a global blueprint for tackling crime, with Rapid7’s Sabeen Malik
53:00
53:00
Play later
Play later
Lists
Like
Liked
53:00
In this episode of the Cyber Uncut podcast, Sabeen Malik, vice-president of global government affairs and public policy at Rapid7, joins Liam Garman to discuss the changing nature of global tech policy – applauding Australia’s stringent cyber security legislation. The pair begin the podcast by discussing Malik’s time developing tech policy within t…
…
continue reading
1
U.S. surveillance reauthorization, Roku breach update, Microsoft breach exposed agencies
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
House passes reauthorization of U.S. surveillance program Roku says 576,000 accounts compromised in latest security breach Microsoft breach exposed federal agencies Thanks to today's episode sponsor, Conveyor It’s Conveyor again, the market-leading AI software for answering security questionnaires and securely sharing your security posture and docu…
…
continue reading
1
Linux Backdoor Infection Scare, Massive Social Security Number Heist
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor. The episode further delves into a cybersecurity incident where hackers stole 340,000 social secur…
…
continue reading
Once every year, Check Point releases an annual report reviewing the biggest events and trends in cybersecurity. In this episode we'll break down the latest iteration, focusing on its most important parts, to catch you up on what you need to know most in 2024.By PI Media
…
continue reading
1
167 - Preparing for and responding to ransomeware attack
34:53
34:53
Play later
Play later
Lists
Like
Liked
34:53
Ransomware is a threat that will be around us for the foreseeable future. In this week's episode we will look at the history of ransomware, the common TTPs in use by threat actors such as Turla, how to align our incident response to that threat and others, and finally how to contain, eradicate, and recover from it. In addition we will answer the fo…
…
continue reading
1
Breaking down a high-severity vulnerability in Kubernetes.
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45
Tomer Peled, a Security & Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster. The research states…
…
continue reading
1
Week in Review: Government hospital warning, Sisence breach, Financial firms lose $12b
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Mike Levin, deputy CISO, 3M Thanks to our show sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated fast. With Vanta, you can automate compliance for in-demand frameworks like…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 12, 2024
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10
This episode features a discussion on Microsoft's cybersecurity troubles, worries about open source, a warning about abusing IT help desks to launch attacks and moreBy Howard Solomon
…
continue reading
1
Checklist 371 - AI and (Probably) Pegasus Re-Revisited
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11
More news of AI tools and shenanigans powered by AI tools. It is an election year, after all. Also - Apple’s let people in 92 countries know that somebody’s trying to take over their iPhones. It is an election year, after all. We’ll tell you more on Checklist No. 371, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist An…
…
continue reading