show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
  continue reading
 
Artwork
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork
 
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
Artwork

1
Caveat

N2K Networks

Unsubscribe
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Weekly
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

Unsubscribe
Unsubscribe
Weekly
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. To get access to extended ad-free Pod Save The World episodes, sign up to be a Friends of ...
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Off The Wall

2600 Enterprises

Unsubscribe
Unsubscribe
Weekly
 
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

Unsubscribe
Unsubscribe
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2023 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

Unsubscribe
Unsubscribe
Monthly+
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Loading …
show series
 
Two words describe last night’s presidential debate: Elder abuse. President Biden’s alarming physical appearance, peculiar affect and robotic performance confirmed what’s long been discernable: The man is of an age and mental condition that disqualifies him from serving the next four years in the world’s most demanding job. And those who insist tha…
  continue reading
 
Overview A look into CISA’s Known Exploited Vulnerability Catalogue is on our minds thisweek, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,Roundcube, the Linux kernel and more. This week in Ubuntu Security Updates 175 unique CVEs addressed [USN-6842-1] gdb vulnerabilities (01:10) 6 CVEs addressed in Xenial ESM (16.04 ESM), …
  continue reading
 
Gas chromatograph vulnerabilities reveal medical IoT challenges We never authorized polyfill.io to use our name, says Cloudflare Evolve Bank confirms data breach, undermining LockBit’s Federal Reserve claim Huge thanks to our sponsor, Prelude Security When executives ask the question, are we vulnerable to this threat? How long does it take you to g…
  continue reading
 
On this Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella. Seeyew shares a progress report on the National Cyber Workforce and Education…
  continue reading
 
This is a sponsored Soap Box edition of the Risky Business podcast. Abhishek Agrawal is the CEO and co-founder of Material Security, an email security company that locks down cloud email archives. Attackers have been raiding mailspools since hacking has existed, and with those mailspools now in the cloud with services like o365 and Google Workspace…
  continue reading
 
What Setting Live Traps For Cybercriminals Taught Me About Security https://isc.sans.edu/diary/What%20Setting%20Live%20Traps%20for%20Cybercriminals%20Taught%20Me%20About%20Security%20%5BGuest%20Diary%5D/31038 TeamViewer Compromise https://www.teamviewer.com/en-us/resources/trust-center/statement/ Fortra File Catalyst Vulnerability and PoC https://s…
  continue reading
 
Sonnet 3.5 Support in Fabric, CISA AI Tabletop exercise, Kaspersky ban, China Invasion Scenario, Langchain disilussionment, more… ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.c…
  continue reading
 
Arkansas sues Temu over privacy issues. Polyfil returns and says they were wronged. An NYPD database was found vulnerable to manipulation. Google slays the DRAGONBRIDGE. Malwarebytes flags a new Mac stealer campaign. Patch your gas chromatographs. Microsoft warns of an AI jailbreak called Skeleton Key. CISA tracks exploited vulnerabilities in GeoSe…
  continue reading
 
This week, Alan, Quinta, and Scott were joined once again by Lawfare Tarbell Fellow Kevin Frazier to talk over the week’s big national security news, including: Wiki-plea-ks.” After more than a decade in effective confinement—first at the Ecuadorian embassy in London, then in a British prison—Wikileaks founder Julian Assange is set to plead guilty …
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
Tonight will see the earliest presidential debate in the history of such televised events. The timing raises the suspicion that, if President Biden’s widely documented cognitive disabilities are unmistakably on display, there will still be time for the Democratic Party to engineer a new ticket, replacing both him and his appalling vice president, K…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Adam Bateman, CEO, Push Security. The SaaS a…
  continue reading
 
Android lying Snowblind in the sun Identity verification service exposed data for over a year Polyfill.io JavaScript attack impacts thousands of sites Huge thanks to our sponsor, Prelude Security 30 minutes to peace of mind. That’s what you’ll get with Prelude’s automated threat management platform where you can upload any piece of threat intellige…
  continue reading
 
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train stati…
  continue reading
 
Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. N2K and WiCyS have come together under a common mission to attract, retain, and advance more women in cybersecurity. Together, we strive to support women th…
  continue reading
 
This week Dave shares a story on new documents revealing Jacobs Technology's role in equipping local law enforcement with advanced cell-site simulators (CSS), and discreetly integrating it into vehicles like the Chevrolet Silverado. Ben shares the story of a bipartisan effort to penalize platforms for hosting harmful deepfakes. While this show cove…
  continue reading
 
Critical Progress MOVEit Authentication Bypass Vulnerability https://labs.watchtowr.com/auth-bypass-in-un-limited-scenarios-progress-moveit-transfer-cve-2024-5806/ https://community.progress.com/s/article/MOVEit-Transfer-Product-Security-Alert-Bulletin-June-2024-CVE-2024-5806 Polyfill.io Supply Chain Attack https://cside.dev/blog/more-than-100k-web…
  continue reading
 
Wikileaks's Julian Assange is a free man, deepfakes cause trouble in the playground, and we hear hot takes about ransomware and tales from inside a devastating denial-of-service attack. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, join…
  continue reading
 
LockBit drops files that may or may not be from the Federal Reserve. Progress Software patches additional flaws in MOVEit file transfer software. A popular polyfil open source library has been compromised. DHS starts staffing up its AI Corps. Legislation has been introduced to evaluate the manual operations of critical infrastructure during cyber a…
  continue reading
 
00:00 - PreShow Banter™ — Life is a Highway 04:28 - BHIS - Talkin’ Bout [infosec] News 2024-06-24 05:30 - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions 14:18 - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA 24:30 - Story # 3: CDK suffered another data breach as it was attempting to recove…
  continue reading
 
Multi-factor authentication (MFA) is a critical form of defense for organizations, and threat actors are recognizing that: According to the latest Cisco Talos Incident Response Quarterly Trends report, instances related to MFA were involved in some capacity in half of all security incidents that the Talos team responded to in the first quarter of 2…
  continue reading
 
Dale Peterson interviews Rob Lee on the S4 Main Stage. They cover a lot of ground and Rob is never shy about sharing his opinions and analysis. They discuss: Rob’s first S4 PIPEDREAM deployed v. employed distinction … and why 2 years later is it still the most dangerous ICS malware? Are we really more homogenous? What makes a group something that R…
  continue reading
 
House Speaker Mike Johnson confirmed last night what has long been obvious. He told Sean Hannity, “The January 6 committee was, we think, wrongfully constituted. We think the work was tainted. We think that they may have very well covered up evidence and maybe even more nefarious activities.” These findings draw on a rigorous investigation led by R…
  continue reading
 
Episode 353 of the Transatlantic Cable podcast kicks off with news around ransomware attacks, both in the UK and the US. From there, the team discuss updates around the EU’s new DMA (Digital Market’s Act) and how Apple could be a test case for record fines, if they’re found to have abused their market position. To wrap up, the team look at how some…
  continue reading
 
Ben is joined by guest host David Lammy, British MP and Shadow Foreign Secretary. They discuss the upcoming election in the UK on July 4th and how historic a Labour win by Keir Starmer would be, how to read into popular support for Nigel Farage and his far-right party, an election betting scandal from people within Rishi Sunak’s inner circle, and t…
  continue reading
 
Julian Assange to plead guilty and return to Australia Fresh MOVEit bug under attack just hours after disclosure Criminal selling Neiman Marcus customer info for $150K Huge thanks to our sponsor, Prelude Security Don’t be left wondering if you’re protected the next time a new threat hits the news. Week in review listeners can upload their threat in…
  continue reading
 
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Julian Assange finally cuts a deal, pleads guilty, and goes free USA to ban Kaspersky - even updates Car dealer SaaS provider CDK contemplates paying a ransom Intolerable healthcare ransomware attacks continue We revisit Windows proximity bugs via wifi a…
  continue reading
 
Expected follow-up on CVE-2024-30078 From Russia with Love An EU privacy agency complains about Google's Privacy Sandbox? Email @ GRC Security Now SPAM? Orange Tsai needs help! Recall and 3rd Party Leakage Errata The Mixed Blessing of a Crappy PRNG Show Notes - https://www.grc.com/sn/SN-980-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or …
  continue reading
 
The US scrutinizes Chinese telecoms. Indonesia’s national datacenter is hit with ransomware. RedJulliett targets organizations in Taiwan. Researchers can tell where you are going by how fast you get there. A previously dormant botnet targeting Redis servers becomes active. Thousands of customers may have had info compromised in an attack on Levi’s.…
  continue reading
 
Tanya Janca (@shehackspurple on X) joins Ken Johnson (@cktricky) and Seth Law (@sethlaw) for a special episode of the Absolute AppSec podcast. Tanya is currently head of education and community at Semgrep, and is a prominent info security commenter and active contributor to improving the industry for everybody through helping spread values of diver…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
This is Frank Gaffney with the Secure Freedom Minute. Surgeon General Vivek Murthy just declared “gun violence” a public health emergency. He wants “assault weapons” and magazines holding more than ten bullets banned. Fortunately, for those of us committed to the principle of self-defense and the unalienable, God-given right to “own and bear arms,”…
  continue reading
 
The JOHARI methodology simply provides a structure for something that you're probably already doing. However, with the structure comes a standard, which is the benefit to any security team. The team should be speaking the same language, especially in fast moving, dynamic situations. Going into a situation and asking for the "known – knowns” and “Bl…
  continue reading
 
Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated debates over its implications. In this episode, we're charting the history of Section 230, from early landmark legal battles, to modern controversies, and exploring its complexities and the proposed changes that could redefine online speech and platform …
  continue reading
 
Loading …

Quick Reference Guide