Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
The State and Popular Culture
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2023 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. To get access to extended ad-free Pod Save The World episodes, sign up to be a Friends of ...
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
One minute of national security with Frank Gaffney
…
continue reading
The straight up cybersecurity news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more! Hosted by Dr. Doug White, Josh Marpet, and Aaran Leyland.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Explore the critical world of information security, innovation, and compliance with expert guests. Learn about the latest threats, tips, and trends in the rapidly evolving cybersecurity environment.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
1
Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17
Enjoy this special encore episode where we are joined by, Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technol…
…
continue reading
1
How To Find Great People to Work With - UBI & Talent Distribution
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31
This reminds me of a very similar lesson I learned when hiring in cybersecurity over 20 years: exposing people to training and encouragement makes the stars stand out, but it doesn’t turn everyone into stars. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X…
…
continue reading
1
The playbook for outpacing China. [Research Saturday]
26:46
26:46
Play later
Play later
Lists
Like
Liked
26:46
This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies c…
…
continue reading
1
7MS #640: Tales of Pentest Pwnage – Part 63
43:19
43:19
Play later
Play later
Lists
Like
Liked
43:19
This was my favorite pentest tale of pwnage to date! There’s a lot to cover in this episode so I’m going to try and bullet out the TLDR version here: Sprinkled farmer files around the environment Found high-priv boxes with WebClient enabled Added “ghost” machine to the Active Directory (we’ll call it GHOSTY) RBCD attack to be able to impersonate a …
…
continue reading
We finally have an excuse to tear down Telegram! Their CEO got arrested by the French, apparently not because the cryptography in Telegram is bad, but special guest Matt Green joined us to talk about how the cryptography is bad anyway, and you probably shouldn't use Telegram as a secure messenger of any kind! Transcript: https://securitycryptograph…
…
continue reading
1
Cyber Security Today - Week In Review for the September 7th, 2024
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07
Toronto School Board Hack & Cybersecurity Best Practices: Expert Panel Discussion Welcome to the weekend edition of Cybersecurity Today, hosted by Jim Love! Join our expert panel featuring Terry Cutler from Cyology Labs, David Shipley of Beauceron Security, and special guest Dana Proctor from IBM Security Services Canada. This episode dives into re…
…
continue reading
It’s a quiet week, so ask me anything on: data breaches, 3D printing, home automation, Australia, cars, anything else?; Sponsored by Report URI https://www.troyhunt.com/weekly-update-416/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
Week in Review: MFA bypass bust, Airport security SQL, GitHub help malware
24:53
24:53
Play later
Play later
Lists
Like
Liked
24:53
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Justin Somaini, partner, YL Ventures Thanks to our show sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process au…
…
continue reading
1
Blizzard warning: Russia’s GRU unleashes new cyber saboteurs.
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21
Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affec…
…
continue reading
1
Fireside Chat: Bennett Pursell on the OpenSSF Siren Threat Intel Project
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37
In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transpar…
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20…
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20…
…
continue reading
Texas Representative Chip Roy has just released indispensable documentation of the dangerous “fundamental transformation” of America accomplished by the Biden-Harris administration in just four years by deliberately facilitating a human tidal wave into America of mostly unaccompanied military-age men from 160 countries. They include: terrorists, ca…
…
continue reading
Overview The long awaited preview of snapd-based AppArmor file prompting is finallyseeing the light of day, plus we cover the recent 24.04.1 LTS release and thepodcast officially moves to a fortnightly cycle. This week in Ubuntu Security Updates 45 unique CVEs addressed [USN-6972-4] Linux kernel (Oracle) vulnerabilities 18 CVEs addressed in Xenial …
…
continue reading
1
Ep11: Cyberwarfare takes an ominous turn
1:15:13
1:15:13
Play later
Play later
Lists
Like
Liked
1:15:13
Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chi…
…
continue reading
1
Planned Parenthood cyberattack, DoJ propaganda takedown, Microchip Technology theft
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44
Planned Parenthood suffers cyberattack DoJ propaganda domains takedown Microchip Technology confirms data theft Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process automation, AI, and over 75 nativ…
…
continue reading
1
163. Mic Drop: From banned to beloved, the Taliban’s unexpected embrace of the Internet
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23
Afghanistan’s Taliban leadership may have smashed TVs in the 1990s, but these days their embracing slickly-produced videos and social media influencers to try to rehab their image abroad. Afghan anthropologist Omar Sharifi unpacks whether its working.By Recorded Future News
…
continue reading
1
AI - What did you miss this summer? Hasthtag Trending for Friday, September 5th, 2024
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36
AI Summer Recap: OpenAI's GPT 5, GPT Next, and Beyond Join host Jim Love as he navigates through the major AI and cybersecurity stories that dominated summer 2023. From CrowdStrike's impact on Windows security to OpenAI's tantalizing announcements of GPT 4.0 Omni and the anticipated GPT Next, this episode reflects on the giant strides in AI technol…
…
continue reading
1
Ambition & UBI - Why People Are Working Less
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
The idea that Universal Basic Income (UBI) reduces the need to work isn't new, but recent studies show it doesn't lead to better jobs or more education. Instead, people just work less. | by Alex Howlett | MORE Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on …
…
continue reading
1
UL NO. 448: TSA SQLi, NYT Github, NK RPM, NVIDIA Mystery...
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19
Becoming Attention, Weighting on OpenAI, Ozempic and Aging?, and more... ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedi…
…
continue reading
1
ISC StormCast for Friday, September 6th, 2024
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04
Enrichment Data: Keeping it Fresh https://isc.sans.edu/diary/Enrichment%20Data%3A%20Keeping%20it%20Fresh/31236 Veeam Update https://www.veeam.com/kb4649 New OFBiz Vulnerabilities https://www.rapid7.com/blog/post/2024/09/05/cve-2024-45195-apache-ofbiz-unauthenticated-remote-code-execution-fixed/ Cisco Smart License Manager Patches https://sec.clouda…
…
continue reading
1
Snake Oilers: Authentik, Dropzone and SlashID
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03
In this edition of Snake Oilers Patrick Gray gets pitches from three cybersecurity companies: Authentik, an open source identity provider that a lot of large organisations are deploying on prem as an alternative to cloud-based IDPs Dropzone AI, an LLM-based agent that can do the work of a Tier 1 SOC analyst SlashID, an identity security company tha…
…
continue reading
The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets f…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
1
The "Third Anniversary Hot Take Takedown: Comeuppance" Edition
1:10:56
1:10:56
Play later
Play later
Lists
Like
Liked
1:10:56
This week, Alan, Quinta, and Scott celebrated the third anniversary of Rational Security 2.0 with their Lawfare colleagues Molly Reynolds, Natalie Orpett, and Tyler McBrien, who sat in brutal judgment as the three co-hosts pitched them their hottest takes yet, including: Are concerns about judicial ethics overblown? Do ethics require that we open t…
…
continue reading
1
Patriotic Governors Must Not Comply with UN Power-grabs, Either
1:00
1:00
Play later
Play later
Lists
Like
Liked
1:00
Last week, Republican governors threw down with globalists determined to crush our sovereignty and personal freedoms. Most of them had previously rejected then-impending treaties designed to give the World Health Organization’s Marxist Director General authority over our health care policies in case of a pandemic or other so-called “public health e…
…
continue reading
1
Hiring Cyber Teenagers with Criminal Records
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our guest, Adam Arellano, vp, enterprise cybersecurity, PayPal. In this episode:…
…
continue reading
Episode 362 of the Kaspersky podcast kicks off with discussion around Brazil’s controversial decision to ban Elon Musk’s X platform. From there the team discuss a story from the BBC around the theft of a voice actors voice, which was used on an A.I platform. To wrap up the team discuss how scammers are looking to use sextortion tactics in order for…
…
continue reading
1
Spyware research, Cicada rebrand, MacroPack malware
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05
Spyware research report They found a way to make Cicadas more annoying MacroPack red teaming tool used for malware Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process automation, AI, and over 75 na…
…
continue reading
1
"Active Listening" software reportedly used to listen in on smart phone conversations. Cyber Security Today for Thursday, September 5, 2024
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42
Is Your Phone Spying on You? D Link Vulnerabilities & Government Data Requests In this episode of Cyber Security Today, host Jim Love discusses critical remote code execution vulnerabilities in D Link routers, impacting their discontinued DIR 846 series. These flaws, including CVE 2024 44341 and CVE 2024 44342, pose significant risks, prompting D L…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how the ease of registering an LLC in Colorado has led to a surge in fraudulent businesses. She discusses how residents receiving suspicious mail addressed to fake LLCs registered at their homes are overwhelming the state's Secretary of State with thous…
…
continue reading
1
The battle between tech giants and legal systems.
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06
This week, Ben delves into the escalating clash between Elon Musk and a Brazilian judge, centered around the contentious issue of content moderation on X/Twitter. Meanwhile, Dave explores a looming challenge to Section 230 immunity, which could redefine the legal landscape for online platforms. Please take a moment to fill out an audience survey! L…
…
continue reading
1
ISC StormCast for Thursday, September 5th, 2024
6:50
6:50
Play later
Play later
Lists
Like
Liked
6:50
Scans for Moodle Learning Platform Following Recent Update https://isc.sans.edu/diary/Scans+for+Moodle+Learning+Platform+Following+Recent+Update/31230 PyPi Rivival HiJack https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/ Android Updates https://source.android.com/docs/security/bulletin/2024-09-01 Mediatec W…
…
continue reading
1
The Godfather club, and AirTags to the rescue
54:16
54:16
Play later
Play later
Lists
Like
Liked
54:16
There's a whole new dating scam that could mean you end up out of pocket (or beaten up) after a first date with a glamorous admirer, and a woman in Los Alamos uses an Air Tag to entrap a thief. Plus - don't miss our featured interview with Maya Levine of Sysdig. All this, and a very bad Cockney accent, in the latest edition of the "Smashing Securit…
…
continue reading
1
Hacker Heroes - Mark Loveless - PSW Vault
1:32:39
1:32:39
Play later
Play later
Lists
Like
Liked
1:32:39
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
…
continue reading
1
Hacker Heroes - Mark Loveless - PSW Vault
1:32:39
1:32:39
Play later
Play later
Lists
Like
Liked
1:32:39
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
…
continue reading
Researchers find Yubikeys vulnerable to cloning. Google warns of a serious zero-day Android vulnerability. Zyxel releases patches for multiple vulnerabilities. D-Link urges customers to retire unsupported vulnerable routers. Hackers linked to Russia and Belarus target Latvian websites. The Federal Trade Commission (FTC) reports a sharp rise in Bitc…
…
continue reading
The FBI arrested one of New York Governor Kathy Hochul’s former top aides for serving with her also-indicted husband the interests of the Chinese Communist Party while doing her day job. These indictments call to mind an urgent heads-up then-Secretary of State Mike Pompeo gave the nation’s governors in 2020. He warned that they and their administra…
…
continue reading
Although we paused on publishing narrated versions of WIRED articles in this feed, you will still hear the latest in tech and politics from the WIRED team. Join host Leah Feiger and a rotation of guests as they guide you through the exciting, challenging, and sometimes entertaining vortex of internet extremism, conspiracies, and disinformation on W…
…
continue reading
Although we paused on publishing narrated versions of WIRED articles in this feed, you will still hear the latest in tech from the WIRED team. On WIRED's Gadget Lab, you'll find hosts Lauren Goode and Michael Calore tackling the biggest questions in the world of tech with knowledgeable WIRED reporters. You can expect the best of WIRED's breaking ne…
…
continue reading
1
Hamas Executes Hostages, Israelis Protest Netanyahu
1:22:32
1:22:32
Play later
Play later
Lists
Like
Liked
1:22:32
Tommy and Ben discuss the discovery of six Israeli hostages killed by Hamas, protests in Israel demanding Israeli Prime Minister Netanyahu agree to a ceasefire and hostage release deal, how Biden’s rhetoric about Gaza gives Netanyahu political cover, and the challenges of the UN’s Polio vaccination rollout in Gaza. They also talk about what an elec…
…
continue reading
1
Halliburton data stolen, Columbus sues researcher, White House protects internet
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30
Halliburton confirms data stolen in cyberattack City of Columbus sues researcher after ransomware attack White House publishes plan to protect a key component of the internet Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-i…
…
continue reading
1
UL Google Current State A Waste of Money & Talent
2:53
2:53
Play later
Play later
Lists
Like
Liked
2:53
Google is slowly getting rid of all the best things it has. The main thing Google is growing is its graveyard. Such a colossal waste of money and talent. Their failures should be studied for centuries as an example of what happens when you don’t lead with UX-focused product management, rather than “throw shit at wall”-focused engineering. Subscribe…
…
continue reading
1
Risky Business #762 -- Brazil nukes X, Iranian APTs deploy ransomware
1:04:46
1:04:46
Play later
Play later
Lists
Like
Liked
1:04:46
On this week’s show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Brazil’s supreme court bans X-formerly-Twitter, Iranian cyber teams cooperate with ransomware crews While North Koreans wield chrome-windows 0-day Yubikey cloning attack is impressive, but doesn’t have us binning our keys quite yet The White House is comi…
…
continue reading
1
SN 990: Is Telegram an Encrypted App? - CrowdStrike Exodus, DDoS-as-a-Service, 'Active Listening' Ad Tech?
2:09:19
2:09:19
Play later
Play later
Lists
Like
Liked
2:09:19
Telegram puts End-to-End Privacy in the Crosshairs Free security logging is good for everyone CrowdStrike hemorrhaging customers Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors Yelp's Unhappy with Google Telegram as the hotbed for DDoSass – DDoS as a Service Chrome grows more difficult to exploit Cox Media Group's "Acti…
…
continue reading
1
ISC StormCast for Wednesday, September 4th, 2024
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
Protected OOXML Text Documents https://isc.sans.edu/diary/Protected%20OOXML%20Text%20Documents/31078 Sextortion E-Mails with Photos https://krebsonsecurity.com/2024/09/sextortion-scams-now-include-photos-of-your-home/ Zyxel OS Command Injection Vulnerability https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-…
…
continue reading