Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Deception, influence, and social engineering in the world of cyber crime.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Daily update on current cyber security threats
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
Thinking about the intersection of security, technology, and society—and what might be coming next. A curated 15-30 minute summary of the week's most important stories and ideas every Monday, and periodic essays and guest appearances that explore a single topic.
The latest on cybersecurity threats and news from Mandiant
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
The Government and Popular Culture
Information Security is the name of the game. Don't let the hackers win!
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Penetration testing for Fortune 50 companies since 2008.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Hackers Podcast
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Secure Your Money & Privacy Against Hackers, Taxes & Surveillance. Become a Member - RogueNews.com
A podcast dedicated to bringing the latest news on information security and the industry - from those that work in the industry.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Podcast series covering various topics in security and technology
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
One minute of national security with Frank Gaffney
A new set of vulnerabilities may affect 60 percent of the world’s public email servers worldwide Hundreds of millions of Dell computers potentially vulnerable to attack Apple products hit by fourfecta of zero-day exploits Thanks to our episode sponsor, Boxcryptor We think CISOs also have a right to sleep peacefully at night. Therefore, we recommend…
Android Update https://source.android.com/security/bulletin/2021-05-01?hl=en Dell Privilege Escalation Vulnerability https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-c…
S
Security Now (Audio)

1
SN 817: The Ransomware Task Force - Scripps Health, REvil Hacks Quanta Computer, Emotet Botnet, QNAP
2:20:36
2:20:36
Play later
Play later
Lists
Like
Liked
2:20:36
Picture of the Week. REvil hacks Apple supplier Quanta Computer. World-famous Scripps Health taken down. The Big Emotet Botnet Takedown. Emotet's 4,324,770 eMail addresses. Have I Been Pwned domain-wide notifications. QNAP. Gravity NNTP Newsreader updated to v3.0.11.0 Just a bit more about Dan Kaminsky. Closing the Loop. The Ransomware Task Force. …
P
Paul's Security Weekly

1
Alert Your Star Destroyers - ASW #149
1:11:29
1:11:29
Play later
Play later
Lists
Like
Liked
1:11:29
Rey Bango will be digging into the developer security training conundrum based on his own experiences with secure coding and security training. He'll cover: • The types of security training that work • The role of security champions • How the security and development teams can work together to ensure code is create securely from the start In the Ap…
T
The CyberWire Daily

1
VPN vulnerability exploited for cyberespionage closed. “IT security incident” at medical system. Android banking Trojans and cryptocurrency. Cyber threats to the Tokyo Olympics.
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42
Pulse Secure patches its VPN, and CISA for one thinks you ought to apply those fixes. Apple has also patched two zero-days in its Webkit engine. Scripps Health recovers from what’s said to be a ransomware attack. Researchers describe Genesis, a criminal market for digital fingerprints. Ben Yelin described a grand jury subpoena for Signal user data.…
S
Security In Five Podcast

1
Episode 969 - How Poor Coding In Mobile Apps Continues To Cause AWS Breaches
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54
Misconfigurations and sloppy coding continue to be the cause of cloud breaches. This episode talks about a report that found 40 popular apps with over 100 million installs were leaking sensitive keys in their code. Source: BeVigil - https://bevigil.com/about Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coff…
M
Malicious Life

1
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
30:24
30:24
Play later
Play later
Lists
Like
Liked
30:24
Security BSides – or just ‘BSides’, for short’ – is the first grassroots, DIY, open security conference in the world – with more than 650 events in more than 50 countries. Jack Daniel, one of BSides’ founders, recalls how the conference started, and what do such ‘community-oriented’ events contribute that other events often cannot. The post Creatin…
D
Down the Security Rabbithole Podcast

1
DtSR Episode 445 - TPA Non-Random Cyber Thoughts with Dave Marcus
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43
Prologue I honestly am having a difficult time understanding how this show has gone so long, so many episodes, without sitting down with Dave Marcus 1:1. It hurts my brain. So I rectified this situation and here you are. Dave is one of the best humans in the industry, has a few truckloads of knowledge, and you could stand to learn something from hi…
R
Recorded Future - Inside Security Intelligence

1
207 Navigating the Travel Industry with Threat Intelligence
21:57
21:57
Play later
Play later
Lists
Like
Liked
21:57
Our guest this week is Collin Barry, Director of Cyber Threat Intelligence at Expedia Group. He shares his career path, including globetrotting stops at the CIA and with Booz Allen Hamilton, and what his day-to-day looks like at Expedia Group, leading their threat intelligence efforts, protecting their online travel and marketplace endeavours. He s…
An intensely awaited and timely book comes out tomorrow despite Big Tech’s efforts to prevent its publication. Missouri Senator Josh Hawley’s The Tyranny of Big Tech was a pre-publication bestseller even before Mark Levin’s riveting hour-long discussion of the book’s contents with its author on Fox News last night. That’s because the Senator has pe…
W
WIRED Security: News, Advice, and More

1
US Sanctions on Russia Rewrite Cyberespionage's Rules
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23
The US has sent a loud message to Moscow—though what it's saying isn’t exactly clear.
C
Cyber Security Today

1
Cyber Security Today - Ransomware gang reportedly drops encryption, Saskatchewan insurance broker hit by ransomware and employees put COVD data at risk
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31
Today's podcast reports on a ransomware gang's change of tactics, customer information of a Canadian insurance broker leaked by a ransomware gang and employees bypass company privacy rules putting health information of thousands at riskBy ITWC
C
Cyber Work

1
Lessons cybersecurity can learn from physical security | Cyber Work Podcast
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02
This episode we welcome Jeff Schmidt of Covail to discuss security and risk management, working at the FBI to create the InfraGard program, and what cybersecurity can learn from physical security controls and fire safety and protection. 0:00 - Intro 2:30 - Origin story 4:31 - Stepping stones throughout career 8:00 - Average work day 12:14 - Learnin…
S
SECTION 9 Cyber Security

1
VMware Server: New Drives Installed - 197
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42
Our VMware server is back online with new NVME drives. This project was more work than we had planned for. Still, typical for an IT project. They never go the way you expect them to. FIND US ON 1. Facebook 2. Twitter - DamienHullBy SECTION 9
SHOW NOTES Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Kelsey Segrue, Justin Bollinger, and David Boyd. Stories Title: Deere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, Equipment …
Join our Incident Master BanjoCrashland as we play another round of Backdoors & Breaches (B&B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS & BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477 Incident Mast…
The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Flemming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky.By GovInfoSecurity.com
In this interview Jenny speaks to Krystyna Lennon an amazing coach and hypnotherapist who gained fame with her notorious "hypnodog" act on Britain's got Talent and globally. They discuss all things hypnosis and how these methods of influence and persuasion can be used for ethical purposes as well as for impressing us all on TV. Thanks to Krystyna f…
Overview With 21 CVEs fixed this week we look at updates for Dnsmasq, Firefox,OpenJDK and more, plus we discuss the recent release of Ubuntu 21.04 andmalicious commits in the upstream Linux kernel. This week in Ubuntu Security Updates 21 unique CVEs addressed [USN-4916-2] Linux kernel regression [00:48] 2 CVEs addressed in Trusty ESM (14.04 ESM), X…
N
Naked Security Podcast

1
S3 Ep30: AirDrop worries, Linux pests and ransomware truths
47:39
47:39
Play later
Play later
Lists
Like
Liked
47:39
We investigate whether AirDrop is really as dangerous as researchers claimed. We discuss the pestiferous problem of fake Linux bugs submitted as an academic exercise. We review the latest Sophos Ransomware Report and uncover uncomfortable truths about paying up.https://nakedsecurity.sophos.com/apple-airdrop-has-significant-privacy-leakhttps://naked…
7
7 Minute Security

1
7MS #465: Cyber News - The FBI Might Be Getting Into the IR Biz Edition
53:24
53:24
Play later
Play later
Lists
Like
Liked
53:24
Hey friends! Today Joe "The Machine" Skeen (a.k.a. Gh0sthax) and I talk about some of our favorite news stories, including: FBI removes hacker back doors NSA: 5 security bugs under active nation-state cyberattack Ubiquiti is accused of covering up a ‘catastrophic’ data breach — and it’s not denying it. On a side note, enjoy our podcast about how we…
C
Cyber Security Sauna

1
053| How to Secure Networks and Influence People
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing - especially over the past year as cybersecurity has grown in visibility for companies. So how can CISOs get their security message across to boards, the business, employees and the security team? Joining Janne a…
S
Smashing Security

1
225: Master of your domain, gripe sites, and John Deere Farmergeddon
56:36
56:36
Play later
Play later
Lists
Like
Liked
56:36
Google loses its domain in Argentina, how do gripe sites make their dough, and has John Deere solved the cybersecurity problem? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley. Visit https://www.smash…
E
Eye on Security

1
Automated Defense Brings New Features to Mandiant Advantage
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08
Mandiant Advantage, our SaaS platform, was always intended to house more than just our threat intelligence—and now it does. With the addition of Mandiant Automated Defense and Mandiant Security Validation, we are continuing to roll out new features in a platform that is easily accessible, as well as easy to deploy and scale. Mike Armistead, SVP of …
C
Cyber Security Weekly Podcast

We cross to Silicon Valley and speak with Amir Khan, President, CEO & Founder of cloud computing platform Alkira and their start-up program with Microsoft. Alkira has announced a close collaboration with the Microsoft for Startups program, a select group of emerging businesses hand-picked by Microsoft for the benefits they offer to Microsoft Azure …
C
CISO-Security Vendor Relationship Podcast

1
Pushing This to the Top Of Your Inbox So You Can Delete It Again
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55
All links and images for this episode can be found on CISO Series https://cisoseries.com/pushing-this-to-the-top-of-your-inbox-so-you-can-delete-it-again/ We're following up on our previous email because we love to engage in self-defeat. We assume you don't want to hear from me again, but just to make sure, I've delivered another email for you to d…
T
The Loopcast

1
Offense and Defense in Information Security
1:05:46
1:05:46
Play later
Play later
Lists
Like
Liked
1:05:46
Joe Slowik examines the roles of offense and defense in information security. You can read more of Joe's work at Pylos. The book that serves as good background material for this conversation is Matthew Monte's Network Attacks and Exploitation: A Framework. The interview today was conducted by Sina Kashefipour and show is produced by Chelsea Daymon …
The latest edition of the ISMG Security Report features an analysis of ransomware gang REvil’s threat to release stolen Apple device blueprints unless it receives a massive payoff. Also featured: discussions of the importance of a “shift left” strategy and efforts to secure cryptocurrencies.By CareersInfoSecurity.com
S
Symantec Cyber Security Brief Podcast

1
Pulse Secure VPN zero-day, SolarWinds and Exchange Server developments, and spies approach UK employees on social media
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56
On this week’s Cyber Security Brief, Alan Neville joins Brigid O Gorman and Dick O’Brien to discuss the recent discovery of a zero-day vulnerability in popular VPN product Pulse Secure. We also discuss some recent developments in the SolarWinds and Microsoft Exchange Server stories. Finally, we discuss a recent potential data breach at software tes…
We speak to Tanu Balla from the Azure Hybrid Networking team about Azure Bastion. We also cover security news about Azure Sentinel, DataBricks, PowerBI, App Service, Power Fx, TypeScript, Azure Active Directory, a new Azure Security Technical Implementation Guide (STIG) and Azure App Proxy.
This week I discuss the offense (investigations) and defense (privacy tactics) surrounding the aftermath of the Capitol siege, plus the latest privacy news.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorseme…























