Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily update on current cyber security threats
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
A Cyber Security Podcast, focussed on Threat Research and the interesting people behind it.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @OffTheHook@hackers.town
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
An edgy and informative look at the biggest U.S. national security and geopolitical issues making headlines right now. Less about hot takes and more about depth, the Threat Status podcast is helmed by veteran Washington Times journalists Ben Wolfgang and Guy Taylor and features regular appearances by insiders with expertise on war, politics and global affairs.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2023 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
A weekly podcast from AlertsUSA, Inc summarizing content from the National Threat and Incident Notification Service for Mobile Devices.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research: Threat Actors Actively Exploiting CVE-2024-24919: Underground Forums Share IP Addresses of Vulnerable Check Point Security Gateway Devices
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30
A critical vulnerability (CVE-2024-24919) with a CVSS score of 8.6 has been discovered in EOL Check Point devices, allowing remote attackers to read arbitrary files. The Hacktivist group "Ghost Clan Malaysia" has shared affected IP addresses worldwide. Upgrade to supported versions and apply necessary hotfixes immediately to protect your data and i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Threat Intelligence: Getting to know the adversary
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48
"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'AngeloJoin us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics be…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shifting Cybersecurity Philosophy from Threat-Centric to Compromise-Centric - Martin Roesch - ESW #366
42:32
42:32
Play later
Play later
Lists
Like
Liked
42:32
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
…
continue reading
The bonus episode of the rapid fire questions with Loren Kohnfelder. Connect with Loren Kohnfelder LinkedIn: https://www.linkedin.com/in/kohnfelder/ Designing Secure Software Book: https://a.co/d/07h5nQna Connect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.com James McQuiggan - https://w…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: A Busy Few Weeks in Ukraine
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50
Over the last two weeks, the Russians have bombed a children’s hospital in Kyiv, Hungarian leader Viktor Orbán has been on an international peace mission, the NATO summit has taken place in Washington, and Ukrainian forces have continued to struggle to hold territory. To go over a busy few weeks, Lawfare Editor-in-Chief Benjamin Wittes sat down wit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Worst Cyber Event in History: CrowdStrike Update Causes Global Chaos. Cyber Security Today Special Edition for Monday, July 22, 2024
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12
Join Jim Love on a special edition of Cybersecurity Today and Hashtag Trending as he delves into the recent CrowdStrike incident that led to a global IT meltdown. With over 8.5 million Windows devices affected by a faulty CrowdStrike Falcon update, this event is being compared to Y2K and WannaCry. Discover the widespread impacts across key industri…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The current state of Cyber Threat Intelligence.
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, Octob…
…
continue reading
Widespread Windows Crashes Due to Crowdstrike Updates https://isc.sans.edu/diary/Widespread%20Windows%20Crashes%20Due%20to%20Crowdstrike%20Updates/31094 https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/ https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/ https://techcommunity.microsoft.c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Archive: Viktor Orbán Switches Democracy Off
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16
From April 14, 2020: Nobody has been more aggressive about using the coronavirus crisis to seize power than Hungarian strong man Viktor Orbán. Orbán declared a state of emergency and has been ruling by decree. He has also instigated criminal penalties for spreading false information about the coronavirus, and his Fidesz party has effectively dissol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: James Hadley: Spend time on what interests you. [CEO] [Career Notes]
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James fe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What Happened With the CrowdStrike Update and Azure Outage
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47
CrowdStrike said a problem with an update the company pushed to Falcon sensors on Windows hosts on July 18 caused a blue screen of death, an issue that coincided with a Microsoft Azure outage and widespread outages across airlines, banks, hospitals, and other services. Our story on this incident: https://duo.com/decipher/crowdstrike-windows-update-…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Homeland Security Weekly Update - July 20, 2024
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01
In this week's update we look into the latest details on the attempted assassination of Donald Trump, as well as the content of a pre-Olympic security warning issued by the US Embassy France. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Trump Trials and Tribulations Weekly Round-up (July 18, 2024)
1:28:23
1:28:23
Play later
Play later
Lists
Like
Liked
1:28:23
This episode of “Trump's Trials and Tribulations,” was recorded on July 18 in front of a live audience on YouTube and Zoom. Lawfare Editor-in-Chief Benjamin Wittes spoke to Lawfare Legal Correspondent and Legal Fellow Anna Bower and Lawfare Senior Editor Roger Parloff about Judge Cannon’s order dismissing the classified documents case against Trump…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Olympic scammers go for gold. [Research Saturday]
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30
This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake ti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Researcher detects what could have been one of the largest supply chain vulnerabilities to date. Cyber Security Today Weekend for July 20th
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29
Dodging the Biggest Supply Chain Attack Ever: An Insight with JFrog's Security Research Team In this weekend edition of Cyber Security Today, host Jim Love discusses with Brian Moussalli, the Security Research Team Lead at JFrog, how potentially the biggest supply chain attack was averted. They delve into the intricacies of supply chain attacks, th…
…
continue reading
A Crowdstrike update takes down IT systems worldwide. A U.S. District Court judge dismissed most charges against SolarWinds. Sophos examines the ransomware threat to the energy sector. European web hosting companies suspend Doppelgänger propaganda. An Australian digital prescription services provider confirms a ransomware attack affecting nearly 13…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Analyzing the CrowdStrike Incident and Its Ripple Effects - SWN #399
42:23
42:23
Play later
Play later
Lists
Like
Liked
42:23
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rumored Wiz Deal Would be HISTORIC (if it happens), redefining shared responsibility - ESW #368
54:43
54:43
Play later
Play later
Lists
Like
Liked
54:43
In this week's enterprise security news, Google is rumored to be considering acquiring Wiz for $23 BILLION ThreatConnect acquires Polarity XBOW and Sola Security are interesting new companies we’ll discuss What does “shared responsibility” actually mean? Palo Alto probably isn’t going to buy your startup Snowflake-related breaches continue getting …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What's wrong with the cybersecurity industry and what we can do about it - Richard Hollis - ESW #368
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47
On this segment, we're going to zoom all the way out to discuss one of my favorite topics: what's fundamentally wrong with this industry? I believe we're at an inflection point: security teams have budget, staff, and more sway at the board level than ever. The cybersecurity market is doing great - growing at an astonishing rate with cyber startups …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Book Discussion: Jump-start Your SOC Analyst Career - Jarrett Rodrick, Tyler Wall - ESW #368
34:39
34:39
Play later
Play later
Lists
Like
Liked
34:39
Three years after we last discussed this book on episode #221, Jarrett Rodrick returns, joined by co-author Tyler Wall to discuss an update of the book. We talk opportunities and layoffs. Career paths and experience. Degrees, certifications, and home labs. We talk about who cybersecurity is the right field for, and the pros and cons of the industry…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep5: CrowdStrike's faulty update shuts down global networks
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Three Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and t…
…
continue reading
Send us a Text Message. Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing. This initiative not only identified the sector’s primary c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Rebecca Crootof on AI, DARPA, and the ELSI Framework
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
Rebecca Crootof, Professor of Law at the University of Richmond School of Law and the inaugural ELSI Visiting Scholar at DARPA, joins Kevin Frazier, a Tarbell Fellow at Lawfare, to discuss the weaponization of emerging technologies and her role as the inaugural ELSI Visiting Scholar at DARPA. This conversation explores the possibility of an AI arms…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why does Iran want to kill Donald Trump? And an in-depth interview with Pentagon spokesman Maj. Gen. Pat Ryder
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29
Maj. Gen. Pat Ryder, Pentagon press secretary, joins the show to talk about U.S. deterrence, the troop withdrawal from Niger, China-Russia military cooperation, the American-led war against Yemen's Houthi rebels, and more. Then, Ben and Guy dive into revelations that Iran tried to assassinate Donald Trump, and Guy takes us inside this week's Aspen …
…
continue reading
In this episode of State of Cybercrime, co-hosts Matthew Radolec and David Gibson dive into the details around LockBit, and cover other news including: + The MOVEit authentication bypass flaw + Developments in the Polyfill supply chain attack affecting millions of websites + Updates on the targeted campaign against Snowflake +A massive insider brea…
…
continue reading
Oracle Quarterly Critical Patch Update https://www.oracle.com/security-alerts/cpujul2024.html Exchange Online Implementing Inbound SMTP DANE with DNSSEC https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-public-preview-of-inbound-smtp-dane-with-dnssec-for/ba-p/4155257 VPN Port Shadowing Vulnerability https://petsymposium.org/popet…
…
continue reading
Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we'd all be in screwed, Exim has not been replaced by something better and its vulnerable, CISA's red team reports, and attackers use d…
…
continue reading
Cisco has identified a critical security flaw in its SSM On-prem. The world's largest recreational boat and yacht retailer reports a data breach. The UK’s NHS warns of critically low blood stocks after a ransomware attack. Port Shadow enables VPN person in the middle attacks. Ivanti patches several high-severity vulnerabilities. FIN7 is advertising…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
3D Printing For Hackers - David Johnson - PSW #835
1:03:50
1:03:50
Play later
Play later
Lists
Like
Liked
1:03:50
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rational Security: The “Million Dollar Babydog” Edition
1:11:01
1:11:01
Play later
Play later
Lists
Like
Liked
1:11:01
This week Alan, Quinta, and Scott were joined by Lawfare Executive Editor Natalie Orpett to talk through one of the most eventful weeks in national security news in recent history, including: “Too Close for Comfort.” Former President Trump narrowly avoided an assassination attempt this past weekend that ultimately left one rally-goer dead and two o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ventas Inc.’s Brian Palmer on Managing Cybersecurity Challenges in Real Estate
34:19
34:19
Play later
Play later
Lists
Like
Liked
34:19
In our latest episode of the Future of Threat Intelligence podcast, Brian Palmer, Director of IT Security and Infrastructure at Ventas, Inc. highlights the critical importance of translating cyber risk into business language, making it comprehensible and actionable for executives and board members. Brian shares his unique insights on balancing tech…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Michael Beckley and Arne Westad on the U.S.-China Relationship
55:54
55:54
Play later
Play later
Lists
Like
Liked
55:54
On today’s episode, Matt Gluck, Research Fellow at Lawfare, spoke with Michael Beckley, Associate Professor of Political Science at Tufts, and Arne Westad, the Elihu Professor of History at Yale. They discussed Beckley’s and Westad’s articles in Foreign Affairs on the best path forward for the U.S.-China strategic relationship—in the economic and m…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
teissTalk: A playbook for new CISOs - learnings from years in the trenches
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Australia’s AUKUS officials, part 1: Hugh Jeffrey, Deputy Secretary SP&I
1:03:32
1:03:32
Play later
Play later
Lists
Like
Liked
1:03:32
What is Australia’s concept of ‘National Defence’ and where does AUKUS fit into it? What misconceptions exist about AUKUS Pillar One? What progress has been made to realise the potential of AUKUS Pillar Two? In this episode, Hugh Jeffrey joins Rory Medcalf to discuss Australia’s current strategic landscape, the Defence Strategic Review, National De…
…
continue reading
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as AVNeutralizer for many years. SentinelOne researchers Antonio Cocomazzi helps us dig into the group's tactics and tools. Read Antonio's new research here: https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enh…
…
continue reading
Who You Gonna Call: Androx Gh0st Busters! https://isc.sans.edu/diary/Who%20You%20Gonna%20Call%3F%20AndroxGh0st%20Busters!%20%5BGuest%20Diary%5D/31086 Cisco Smart Software Manager Vulnerability CVE-2024-20419 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy Critical Security Flaw in Cisco Secu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trump assassination conspiracies, Squarespace account hijacks, and the butt stops here
55:02
55:02
Play later
Play later
Lists
Like
Liked
55:02
Social media fuels conspiracies galore after Donald Trump is shot at a rally, cryptocurrency websites are hijacked after a screw-up at Squarespace, and our guest takes a close look at bottoms on Instagram. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Ca…
…
continue reading
Interpol pursues West African cybercrime groups. Bassett Furniture shuts down manufacturing following a ransomware attack. A gastroenterologist group notifies patients of a data breach. An Apache HugeGraph flaw is being actively exploited. Octo Tempest updates its toolkit. Satori uncovers evil twin campaigns on Google Play. The cost of the Change H…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Anand Prakash on cloud security startups and next-gen hacking
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
Anand Prakash on cloud security startups and next-gen hacking Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by Se…
…
continue reading