Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily update on current cyber security threats
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The State and Popular Culture
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2023 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. To get access to extended ad-free Pod Save The World episodes, sign up to be a Friends of ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
One minute of national security with Frank Gaffney
…
continue reading
The straight up cybersecurity news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more! Hosted by Dr. Doug White, Josh Marpet, and Aaran Leyland.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
…
continue reading
Most of you will have read or heard some of the coverage of the relationship between the military and video... The post Subscribercast #92 – The US Military and Video Games first appeared on Spy Culture.By Tom Secker
…
continue reading
North America Travels; This Week’s Data Breaches; Exploding Pagers Isn’t (Directly) a Cyber Security Story; The Magic of 3D Printing; Sponsored by 1Password https://www.troyhunt.com/weekly-update-418/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19
Enjoy this special encore episode, where we are jjoined by Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla int…
…
continue reading
1
Steve Blank, national security, and the dilemma of technology disruption. (Part 1 of 2)
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25
In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. In this series, Steve Blank, a renowned expert in national security innovation, explores the critic…
…
continue reading
1
Ep13: The Consolation of Threat Intel (JAG-S LABScon keynote)
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41
Three Buddy Problem - Episode 13: This is a special edition of the show, featuring Juan Andres Guerrero-Saade's full keynote day remarks at LABScon2024. In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disen…
…
continue reading
1
Hook, line, and sinker. [Research Saturday]
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42
Jonathan Tanner, Senior Security Researcher from Barracuda, discussing their work on "Stealthy phishing attack uses advanced infostealer for data exfiltration." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. The attack begins with a phishing email containing …
…
continue reading
1
A hacker's view of civic infrastructure: Cyber Security Today - Special Feature
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38
A Hacker's Perspective on Vulnerable Civic Infrastructure In this episode, host Jim Love explores the vulnerabilities of civic infrastructure with cybersecurity expert Nick Aleks. They discuss how hackers view and exploit city systems, the dangers of default passwords and outdated firmware, and the risks associated with smart buildings and operatio…
…
continue reading
1
Episode 101: The GHOST Threat Hunting Team
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39
In this episode Michael, Mark and Sarah talk to Matt Zorich and Waymon Ho of the Microsoft GHOST team. We discuss the role GHOST plays in protecting both Microsoft and our customers from nation-state threat actors. We also cover the latest security news about Event Grid, NetApp Files, Chaos Studio and AKS. https://aka.ms/azsecpod…
…
continue reading
1
Week in Review: LinkedIn’s AI chicanery, AT&T FCC settlement, Craigslist defense network
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Mike Rosen, CISO, ZwillGen, advisor to NightDragon and Villager at Team8, whose favorite story of the week was Starlink’s ability to detect stealth aircraft. Check it out. Thanks to our show sponsor, Conveyor Why do teams choose Conveyor…
…
continue reading
An FTC report confirms online surveillance and privacy concerns. Ukraine bans Telegram for state and security officials. Sensitive customer data from India’s largest health insurer is leaked. German law enforcement shuts down multiple cryptocurrency exchange services. HZ RAT sets its sights on macOS systems. Stolen VPN passwords remain a growing th…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
GSX Daily: Career Hunting? Know Your Self-Worth
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46
In this special GSX 2024 edition of the SM Highlights podcast, sponsored by Sign In Solutions, Orange County Convention Center security administrator Earl Biggett, Jr., CPP, shares some career advice—especially for people changing from the public to the private sector—and how working in concierge security positions changed his approach to his job a…
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Play later
Play later
Lists
Like
Liked
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Supply chain targets 3,000 users. Cyber Security Today for Friday, September 20, 2024
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43
Cybersecurity Today: Supply Chain Attacks, Data Breaches, and Botnet Threat Disruptions In this episode of 'Cybersecurity Today,' host Jim Love covers pressing issues in the cybersecurity world, including a supply chain attack in Lebanon, a major data breach at AT&T resulting in a $13 million fine, and the disruption of the Chinese botnet known as …
…
continue reading
This is Frank Gaffney with the Secure Freedom Minute. Israel’s continuing attacks on Hezbollah suggest that the Netanyahu government has reached an unavoidable conclusion:There’s a narrow – and rapidly closing window – in which the Jewish State can act decisively to defeat her enemies and ours. That’s because, whichever way the U.S. presidential el…
…
continue reading
1
167. Mic Drop: TikTok’s day in Appeals Court
15:18
15:18
Play later
Play later
Lists
Like
Liked
15:18
TikTok’s lawyers were in a U.S. Court of Appeals this week trying to push back against a law that requires the popular video app to sell its American subsidiary to a non-Chinese owner or be banished from app stores. Alan Rozenshtein, an associate professor at the University of Minnesota, and expert in lawfare, explains what’s at stake.…
…
continue reading
1
INC targets healthcare, Providence schools cyberattack, Apple iPads bricked
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
New INC ransomware targets U.S. healthcare sector Providence public schools deal with irregular internet activity Apple pulls iPadOS 18 update that was bricking M4 iPad Pro devices Thanks to today's episode sponsor, Conveyor It’s Friday and Conveyor hopes you don’t have a meaty security questionnaire waiting for you on the other side of this podcas…
…
continue reading
Overview John and Maximé have been talking about Ubuntu’s AppArmor user namespacerestrictions at the the Linux Security Summit in Europe this past week, plus wecover some more details from the official announcement of permission promptingin Ubuntu 24.10, a new release of Intel TDX for Ubuntu 24.04 LTS and more. This week in Ubuntu Security Updates …
…
continue reading
1
ISC StormCast for Friday, September 20th, 2024
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
Fake GitHub Site Targeting Developers https://isc.sans.edu/diary/Fake%20GitHub%20Site%20Targeting%20Developers/31282 Ivanti CSA 4.6 Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US German Police Deanonymizes Tor User https://blog.torproject.org/tor-is-still-safe/ Eve…
…
continue reading
1
My First Thoughts on New OpenAI Strawberry Model ( OpenAI o1-preview)
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02
Here are my first thoughts after using OpenAI's New Strawberry Model for a couple of hours Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See you in the nex…
…
continue reading
The US government disrupts China’s Raptor Train botnet. A phishing campaign abuses GitHub repositories to distribute malware.Ransomware group Vanilla Tempest targets U.S. healthcare providers.Hackers demand $6 million for stolen airport data. The FCC opens applications for a $200 million cybersecurity grant program. GreyNoise Intelligence tracks my…
…
continue reading
1
The “Ms. Jackson, if You’re Nastya” Edition
1:12:47
1:12:47
Play later
Play later
Lists
Like
Liked
1:12:47
This week, Scott and Alan sat down with their Lawfare colleagues Anastasiia Lapatina and Tyler McBrien to go over the week’s big national security news, including: “A Shot Across the Rubicon.” Reports indicate that President Biden and his U.K. allies may be on the verge of giving Ukraine approval to use their advanced weapons systems to strike deep…
…
continue reading
1
Exploding Pagers - Tod Beardsley - PSW #843
2:53:37
2:53:37
Play later
Play later
Lists
Like
Liked
2:53:37
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
Exploding Pagers - Tod Beardsley - PSW #843
2:53:37
2:53:37
Play later
Play later
Lists
Like
Liked
2:53:37
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
Stop World Government for Israel's Sake - and Ours
1:00
1:00
Play later
Play later
Lists
Like
Liked
1:00
Yesterday, the relentlessly anti-Israel United Nations voted to demand that the Jewish State commit suicide. That would be the practical effect of a Palestinian-drafted resolution giving Israelis one year to withdraw to indefensible borders, assuring that enemies determined to destroy her control territory from which to do so. The UN’s Marxist Secr…
…
continue reading
1
Are Phishing Tests Helping or Hurting Our Security Program?
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Dennis Pickett, vp, CISO, Westat. In this episode: Not all educat…
…
continue reading
1
Derailing Raptor Train, Volunteer Civil Cyber Defense, US AI safety summit
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10
Feds derail Raptor Train Newmark creates Volunteer Network for Civil Cyber Defense US to host global AI safety summit Thanks to today's episode sponsor, Conveyor Does the next security questionnaire that hits your inbox make you want to throw your laptop out the window? If so, don’t do it. You should check out Conveyor first. Conveyor is the market…
…
continue reading
1
Fostering ethical leadership: why compassion matters in public service
54:12
54:12
Play later
Play later
Lists
Like
Liked
54:12
How can public policy better reflect the humanity and vulnerability of citizens? How can government leaders remain mindful of individuals within broader systems, and how does this approach improve public policy outcomes? How can governments foster ethical leadership and accountability while balancing political pressures and systemic challenges? In …
…
continue reading
This week, Dave and Joe share some listener follow-up from Clayton about credit card fraud and the potential issues with automatic update services that some cards provide. Dave's story is on sextortion scams targeting spouses, where scammers claim a partner is cheating and provide links to fake "proof." Joe has two stories this week, the first one …
…
continue reading
1
The race for the twenty-first century.
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35
This week, we are joined by Dmitri Alperovitch, author and Chairman of Silverado Policy Accelerator, as he is talking with Ben Yelin about his book, "World on the Brink: How America Can Beat China in the Race for the Twenty-First Century." Ben reviews oral arguments in the TikTok case against the U.S. Government. Dave looks at the hunt for Stingray…
…
continue reading
1
ISC StormCast for Thursday, September 19th, 2024
4:13
4:13
Play later
Play later
Lists
Like
Liked
4:13
Python Infostealer Patching Windows Exodus App https://isc.sans.edu/diary/Python%20Infostealer%20Patching%20Windows%20Exodus%20App/31276 Service Now Knoledge Bases Data Exposures https://appomni.com/ao-labs/servicenow-knowledge-bases-data-exposures-uncovered/ Gitlab Patch https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-rele…
…
continue reading
1
TFL security derailed, and is Trump the king of crypto?
37:57
37:57
Play later
Play later
Lists
Like
Liked
37:57
Transport for London (TfL) suffers a cybersecurity incident and tells its 30,000 staff they will all have to their identities verified... in-person. Who might have been behind the attack and why? Meanwhile, Donald Trump's curious relationship with cryptocurrency is explored. All this and Demi Moore is discussed in the latest edition of the "Smashin…
…
continue reading
Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups’ disinformation campaigns. California’s Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new p…
…
continue reading
In Episode 279 of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss the latest cybersecurity news and issues. Stories include Transportation for London requiring in-person password resets after a security incident, Google’s new ‘air-gapped’ backup service, the impact of a rogue ‘Whois’ server, and the ongoing ramifications of the …
…
continue reading
1
Emasculating Hezbollah, Good for Israel, Good for Us
1:00
1:00
Play later
Play later
Lists
Like
Liked
1:00
Israel yesterday executed a surgical strike against more than three thousand Hezbollah operatives. The “surgery” was executed via typically pocket-borne Iranian-supplied pagers that the Israelis were able to detonate nearly simultaneously across Lebanon. In addition to losing private and other body parts, the terrorist organization sustained what i…
…
continue reading
1
Israel Sends Exploding Pagers to Hezbollah
1:13:34
1:13:34
Play later
Play later
Lists
Like
Liked
1:13:34
Tommy and Ben discuss reports that Israel sent thousands of explosive pagers to members of Hezbollah and whether this signals the beginning of a larger Israeli military operation in Lebanon, what people who have been in national security meetings with Kamala Harris say about her leadership style and new polling about the politics of foreign policy …
…
continue reading
1
Exploding pager analysis, construction company vulnerability, cyberattack job loss
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00
Exploding pager tragedy experts look towards supply chain sabotage Construction companies potentially vulnerable through accounting software Cyberattacks result in job losses Thanks to today's episode sponsor, Conveyor Are customer security reviews constantly interrupting your day? You should check out Conveyor. With an enterprise-grade trust cente…
…
continue reading
1
London Transport requires in person password validation for 30,000 employees, Cyber Security Today for Wednesday, September 18, 2024
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
Emerging Cyber Threats: Repellent Scorpius, TfL Cyber Attack, and Online Safety for Children In this episode, we discuss the emergence of the new ransomware group Repellent Scorpius and their use of the Ciccada 3301 ransomware. We cover the London Transport Authority's (TfL) in-person password resets following a significant cyber attack, and examin…
…
continue reading
1
Risky Business #764 -- Mossad expands into telecommunications services
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56
On this week’s show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Hezbollah’s attempts to avoid SIGINT with pagers ends in explosions The US shines many bright lights on RT’s disinfo role Australia counters Chinese bullying in the Pacific Valid accounts are the most prevalent entry point, says CISA’s data Ivanti and For…
…
continue reading
1
SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE
2:23:39
2:23:39
Play later
Play later
Lists
Like
Liked
2:23:39
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
…
continue reading
1
ISC StormCast for Wednesday, September 18th, 2024
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18
23:59, Time to Exfiltrate! https://isc.sans.edu/diary/23%3A59%2C%20Time%20to%20Exfiltrate!/31272 Critical VMWare VCenter Vulnerability https://blogs.vmware.com/cloud-foundation/2024/09/17/vmsa-2024-0019-questions-answers/ Zero-Click Calendar invite - Critical zero-click vulnerability chain in macOS https://mikko-kenttala.medium.com/zero-click-calen…
…
continue reading
By Emmanuel Goldstein
…
continue reading
1
UL NO. 450: Thoughts on o1-preview and the Path to AGI
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17
80% Chinese Cranes, Drones vs. Abrahams, a RAG kickstart, a Canary-based Security Maturity Model, and more... Check out Wiz for a Free Could Security Scan: https://www.wiz.io/ul Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmie…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
1:02:26
1:02:26
Play later
Play later
Lists
Like
Liked
1:02:26
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
The US charges a Chinese national for spear-phishing government employees. The feds impose new sanctions on the makers of Predator spyware. Dealing with fake data breaches. Researchers discover a critical vulnerability in Google Cloud Platform. D-Link has patched critical vulnerabilities in three popular wireless router models. Snowflake ups their …
…
continue reading