Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Counterbalance is a Hudson Institute podcast hosted by Senior Fellows Michael Doran and Peter Rough. As America's unipolar moment fades, Rough and Doran explore the emerging global order.
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Small bites on Transatlantic Security, NATO, the EU, Russia, and all things Europe. Hosted by Andrea Kendall-Taylor and Jim Townsend at the Center for a New American Security.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
An edgy and informative look at the biggest U.S. national security and geopolitical issues making headlines right now. Less about hot takes and more about depth, the Threat Status podcast is helmed by veteran Washington Times journalists Ben Wolfgang and Guy Taylor and features regular appearances by insiders with expertise on war, politics and global affairs.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
1
Change Healthcare Faces Another Ransomware Threat—and It Looks Credible
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22
Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and has sent WIRED samples of what they claim is the company's stolen data. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
1
Water utility threats, GPT-4 hacking, SIM swap solicitation
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
Sandworm-linked group tied to attack on water utilities GPT-4 reads security advisories Cell carrier workers solicited for SIM swaps Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from sharing your security posture and SOC 2 in a single port…
…
continue reading
1
Episode 88: Budgeting for Security: Optimizing Penetration Testing Investments
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15
Get into the dynamic world of penetration testing with Episode 88 of The Cyber Threat Perspective. Hosts Brad and Tyler discuss how to plan for penetration testing from both a budgeting and success perspective. • How to budget for penetration testing - by evaluating risk and compliance needs. • Discussion on the ways to ensure you're getting value …
…
continue reading
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. We discuss how border security been affected by technology and the current landscape, emerging threats, and the importance of fostering collaboration…
…
continue reading
1
Cyber Security Today, March 25, 2024 - A suspected China threat actor going after unpatched F5 and ScreenConnet installations
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07
This episode reports on a new campaign stealing email passwords, the latest data breaches, and moreBy ITWC
…
continue reading
1
Week in Review: Cisco MFA breach, Bad bots surge, Microsoft mail breach fallout
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday April 19, 2024
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departmentsBy Howard Solomon
…
continue reading
One of Silicon Valley's most influential lobbying arms joins privacy reformers in a fight against the Biden administration-backed expansion of a major US surveillance program. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
1
Cyber Security Today, April 19, 2024 - Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46
This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international, and moreBy Howard Solomon
…
continue reading
1
Do enemies still fear the U.S.? And the Israel-Hezbollah clash enters a new phase
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02
Ben and Guy discuss the growing Israel-Hezbollah clash, foreign influence operations in the U.S., and geopolitical jockeying over AI. Former intelligence officer Daniel Hoffman joins the show to talk about the rise of ISIS-K, the future of the Russia-Ukraine war, and why American deterrence is failing. Plus, the "Threat of the Week." Read Ryan Love…
…
continue reading
1
What are the dangers of enabling sideloading and third-party apps?
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24
Apple now must allow users to be able to sideload apps onto their phones or access third-party app stores, thanks to a law from the European Union that went into effect earlier this year. Terryn Valikodath from Cisco Talos Incident Response joins Jon this week to discuss the potential dangers that come with allowing users to sideload apps onto thei…
…
continue reading
1
CYFIRMA Research - Ivanti RCE (CVE-2024-21894) Vulnerability Analysis and Exploitation
3:01
3:01
Play later
Play later
Lists
Like
Liked
3:01
A critical vulnerability, CVE-2024-21894, has been discovered in Ivanti's Connect Secure and Policy Secure gateways, posing a severe global threat to digital security. CYFIRMA’s research team have conducted a thorough analysis of this vulnerability. Immediate action is strongly advised: apply the latest patches provided by Ivanti to secure your sys…
…
continue reading
1
LabHost police bust, Michigan healthcare attack, Windows Fibers vulnerability
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09
Police bust reveals sophisticated phishing-as-a-service platform Overlooked Windows Fibers offer handy route for malicious payload deployment Michigan healthcare organization suffers data breach Thanks to today's episode sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talk…
…
continue reading
1
The State of the War in Ukraine with Michael Kofman
54:10
54:10
Play later
Play later
Lists
Like
Liked
54:10
As the war in Ukraine continues into its third year, the mood has become increasingly dark. While territorial changes continue to be minor, Russia’s slow but steady advances along the front lines could become large losses for Ukraine. This is especially likely if Kyiv is unable to overcome worsening shortages of both material and personnel. As mili…
…
continue reading
Delinea Secret Server Authn Authz Bypass https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3 Ivanti Avalanche Poc/Details https://www.tenable.com/security/research/tra-2024-10 Advanced Phishing Campaign https://www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phis…
…
continue reading
1
CYFIRMA Research - Threat to Offshore Infrastructure in a Maritime-Centric Century
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00
The most important evolving threat to the electric grids is cyber threats and physical security. The power grid in the US and more so in Europe is experiencing a transformation, as the world shifts to sustainable energy, which entails increased reliance on offshore wind farms and undersea infrastructure that are going to supply large chunks of the …
…
continue reading
By Tresorit
…
continue reading
1
Is change presenting a window of opportunity for attackers?
1:04:22
1:04:22
Play later
Play later
Lists
Like
Liked
1:04:22
Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, sha…
…
continue reading
1
ISC StormCast for Thursday, April 18th, 2024
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19
Malicious PDF File As Delivery Mechanism https://isc.sans.edu/diary/Malicious%20PDF%20File%20Used%20As%20Delivery%20Mechanism/30848 Updated Palo Alto Networks GlobalProtect Guidance https://security.paloaltonetworks.com/CVE-2024-3400 Coordinated Social Engineering Takeovers of Open Source Projects; https://openssf.org/blog/2024/04/15/open-source-se…
…
continue reading
Take That's Gary Barlow chats up a pizza-slinging granny from Essex via Facebook, or does he? And a scam takes a sinister turn - for both the person being scammed and an innocent participant - in Ohio. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault…
…
continue reading
1
Amy Chang on squaring cyber policy with real-world threats
33:39
33:39
Play later
Play later
Lists
Like
Liked
33:39
Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an …
…
continue reading
How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield. Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on…
…
continue reading
1
Weekly: Palo Alto Critical Exploit, VPN Management, RansomHub Leak Optum Data
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30
In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. This weeks topics include: Palo Alto Critical Vulnerability under active exploitation ReliaQuest research on VPN attack surface management Optum Healthcare data breached by RansomHub group…
…
continue reading
1
US Senate to Vote on a Wiretap Bill That Critics Call ‘Stasi-Like’
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50
A controversial bill reauthorizing the Section 702 spy program may force whole new categories of businesses to eavesdrop on the US government's behalf, including on fellow Americans. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
1
Cyber Security Today, April 17, 2024 - More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner, and more
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetingsBy Howard Solomon
…
continue reading
1
Cisco MFA breach, Bad Bots surge, LockBit 3.0 propagates
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38
Cisco announces breach of multifactor authentication message provider Bad bots drive 10% annual surge in account takeover attacks LockBit 3.0 variant generates custom, self-propagating malware Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sh…
…
continue reading
1
ISC StormCast for Wednesday, April 17th, 2024
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33
Palo Alto Networks GlobalProtect exploit public and widely exploited CVE-2024-3400 https://isc.sans.edu/forums/diary/Palo%20Alto%20Networks%20GlobalProtect%20exploit%20public%20and%20widely%20exploited%20CVE-2024-3400/30844/ Putty Private Key Recovery https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html Oracle Critical Pa…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
1
We Could Lower Risk If We Shrunk Our Business
38:19
38:19
Play later
Play later
Lists
Like
Liked
38:19
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Matt Radolec, senior director, incident response and cloud operations, Varonis. In this episode: Why is retaining cyber talent so ha…
…
continue reading
1
House Votes to Extend—and Expand—a Major US Spy Program
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13
US House of Representatives voted on Friday to extend the Section 702 spy program. It passed without an amendment that would have required the FBI to obtain a warrant to access Americans' information. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
1
Hyperautomation, Open Security Data Architecture, and the Future of SIEM with Neal Humphrey
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18
Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market …
…
continue reading
1
How to Use a Magic Quadrant and Other Industry Research
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04
In this episode of Security Visionaries, join host Max Havey dives into the fascinating world of analyst research, centering on the renowned Gartner Magic Quadrant with guests Steve Riley, Field CTO at Netskope and a former Gartner analyst, and Mona Faulkner, Vice President, Analyst Relations at Netskope. In their conversation, they discuss the imp…
…
continue reading
1
Dustin Lehr -- Culture Change through Champions and Gamification
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10
Dustin Lehr, Senior Director of Platform Security/Deputy CISO at Fivetran and Chief Solutions Officer at Katilyst Security, joins Robert and Chris to discuss security champions. Dustin explains the concept of security champions within the developer community, exploring the unique qualities and motivations behind developers becoming security advocat…
…
continue reading
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.By N2K Networks
…
continue reading
1
Threads out in Turkey, Palo Alto backdoor, Microsoft' security overhaul
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Meta to close Threads in Turkey Palo Alto fixes backdoor zero-day Details on Microsoft’s security overhaul Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on sales. As infosec teams become hands on in the sales cycle, proving your value becomes key. A director of GRC said la…
…
continue reading
Quick Palo Alto Networks Global Protect Vulnerablity Update CVE-2024-3400 https://isc.sans.edu/diary/30838 Delinea patches critical vulnerability in secret manager https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3 Lancom Windows Setup Assistant May Reset Password https://www.lancom-systems.com/service-support/general-security-i…
…
continue reading
1
From Idea to Success: How to Operationalize a Startup from Zero to Exit - Seth Spergel - BSW #346
55:40
55:40
Play later
Play later
Lists
Like
Liked
55:40
Startup founders dream of success, but it's much harder than it looks. As a former founder, I know the challenges of cultivating an idea, establishing product market fit, growing revenue, and finding the right exit. Trust me, it doesn't always end well. In this interview, we welcome Seth Spergel, Managing Partner at Merlin Ventures, to discuss how …
…
continue reading
1
How to Stop Your Data From Being Used to Train AI
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54
Some companies let you opt out of allowing your content to be used for generative AI. Here’s how to take back (at least a little) control from ChatGPT, Google’s Gemini, and more. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading