Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Power Problems is a bi-weekly podcast from the Cato Institute. Host John Glaser offers a skeptical take on U.S. foreign policy, and discusses today’s big questions in international security with distinguished guests from across the political spectrum. Podcast Hashtag: #FPPowerProblems. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
"What the Hack with Adam Levin" is the award-winning weekly true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Undocumented commands found in Bluetooth chip used by a billion devicesBy Carl Franklin
…
continue reading

1
AI Bad, PHP, RDP, SuperBlack, VT, Deepseek, MassJacker, Roblox, Aaran Leyland... - SWN #459
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09AI Bad, PHP, Remote Desktop, SuperBlack, Deepseek, Volt Typhoon, MassJacker, Roblox, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-459
…
continue reading

1
Week in Review: ONCD dominates cyber, undocumented Bluetooth commands, DoJ Google breakup
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57Link to episode page Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vant…
…
continue reading

1
AI Is Oversharing and Leaking Data - Sounil Yu - PSW #865
2:07:50
2:07:50
Play later
Play later
Lists
Like
Liked
2:07:50Sounil Yu joins us to kick things off with AI defenses: Enterprise AI search tools like Copilot for Microsoft 365 lack the in-depth access controls required to ensure that query responses align with the user’s need-to-know boundaries. Without proper controls, these tools accelerate the discovery of improperly secured sensitive files within the orga…
…
continue reading

1
CISO vs. CIO, as CISOs Are Opting for Consulting Gigs and Cyber Pros Look for Change - BSW #386
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42In the leadership and communications segment, CISO vs. CIO: Where security and IT leadership clash (and how to fix it), The CISO's bookshelf: 10 must-reads for security leaders, The CISO's bookshelf: 10 must-reads for security leaders, and more! Show Notes: https://securityweekly.com/bsw-386
…
continue reading

1
The Counterfeit Problem: How Blockchain Is Revolutionizing Brand Protection - Noam Krasniansky - BSW #386
1:02:50
1:02:50
Play later
Play later
Lists
Like
Liked
1:02:50Noam Krasniansky, the visionary founder of Komposite Blockchain, joins Business Security Weekly to explore Web3's transformative potential. Noam delves into the basics of blockchain technology, Bitcoin and the meteoric rise of Ethereum, and the critical role of decentralized systems in safeguarding brands against counterfeiting—a global issue costi…
…
continue reading

1
Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17Skype hangs up for good, over a million cheap Android devices may be backdoored, parallels between jailbreak research and XSS, impersonating AirTags, network reconnaissance via a memory disclosure vuln in the GFW, and more! Show Notes: https://securityweekly.com/asw-321
…
continue reading

1
CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321
1:13:50
1:13:50
Play later
Play later
Lists
Like
Liked
1:13:50Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
…
continue reading

1
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397
1:58:32
1:58:32
Play later
Play later
Lists
Like
Liked
1:58:322025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilie…
…
continue reading

1
7MS #665: What I'm Working on This Week - Part 2
28:49
28:49
Play later
Play later
Lists
Like
Liked
28:49Hello there friends, I’m doing another “what I’m working on this week” episode which includes: BPATTY v1.6 release – big/cool/new content to share here PWPUSH – this looks to be an awesome way (both paid and free) to securely share files and passwords
…
continue reading

1
VPN brute-force attacks, water utilities bill, LockBit developer extradited
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Black Basta creates tool to automate VPN brute-force attacks Bipartisan Senate bill offers improved cybersecurity for water utilities LockBit developer extradited from Israel, appears in New Jersey court Thanks to this week episode sponsor, DeleteMe Data brokers bypass online safety measures to sell your name, address, and social security number to…
…
continue reading

1
Tackling Data Overload: Strategies for Effective Vulnerability Remediation
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. From…
…
continue reading
It’s the new Have I Been Pwned brand! Fresh new look, new UI, more features, better stickers, and much more 😊 Sponsored by 1Password https://www.troyhunt.com/weekly-update-443/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
302: KDE Devs launch a company, CrossOver 25, Garuda Linux, & more Linux news
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57video: https://youtu.be/YP0wfUNC7D4 Comment on the TWIL Forum This week in Linux, we have so much to talk about. First of all, KDE developers have launched their own company called TechPaladin Software. Also, the CodeWeavers team has released the latest version of their crossover software with Crossover 25. The Garuda Linux team have the latest rel…
…
continue reading

1
AI Bad, PHP, RDP, SuperBlack, VT, Deepseek, MassJacker, Roblox, Aaran Leyland... - SWN #459
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09AI Bad, PHP, Remote Desktop, SuperBlack, Deepseek, Volt Typhoon, MassJacker, Roblox, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-459
…
continue reading

1
7MS #666: Tales of Pentest Pwnage – Part 68
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35Today we have a smattering of miscellaneous pentest tips to help you pwn all the stuff! Selective Snaffling with Snaffler The importance of having plenty of dropbox disk space – for redundant remote connectivity and PXE abuse! TGTs can be fun for SMB riffling, targeted Snaffling, netexec-ing and Evil-WinRMing!…
…
continue reading
The Democrats may be on the retreat politically but they're hoping to bounce back after an actual retreat this week in Leesburg, Virginia. One of the speakers at the retreat political strategist (and friend of the podcast) James Carville, who's suggested Democrats should "play dead" and do nothing against Trump. The Americast team unpack whether th…
…
continue reading

1
Medusa ransoms infrastructure, Google breakup sought, more Booking.com phishing
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35Medusa ransomware continues to attack infrastructure DoJ seeks to break up Google Another phishing campaign hits Booking.com Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on po…
…
continue reading
Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these fac…
…
continue reading

1
TNW 378: Apple's Upcoming OS Overhaul - AI Creative Writing, Xbox Copilot, AI Citations
1:01:01
1:01:01
Play later
Play later
Lists
Like
Liked
1:01:01Does OpenAI have the capability for creative writing? Would you want to be coached in gaming through AI? What is Apple planning for its possible operating system redesign? And does AI have inconsistencies when providing the correct information to search queries? Amanda Silberling of TechCrunch joins Mikah Sargent this week. Amanda talks about OpenA…
…
continue reading

1
AI Is Oversharing and Leaking Data - Sounil Yu - PSW #865
2:07:50
2:07:50
Play later
Play later
Lists
Like
Liked
2:07:50Sounil Yu joins us to kick things off with AI defenses: Enterprise AI search tools like Copilot for Microsoft 365 lack the in-depth access controls required to ensure that query responses align with the user’s need-to-know boundaries. Without proper controls, these tools accelerate the discovery of improperly secured sensitive files within the orga…
…
continue reading

1
S16 E07 (VIDEO) "Hackers Aren’t Breaking In—They’re Logging In"
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
…
continue reading

1
We've Been Fooled. There Is No Talent Shortage.
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18All links and images for this episode can be found on CISO Series. Check out this post by Rachel Bicknell of Dell Technologies quoting Mic Merritt of Merritt Collective for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Jimmy Sanders, president, ISSA Interna…
…
continue reading

1
Microsoft patches 57 security flaws, Sola aims to build the ‘Stripe for security’, US council wants to counter China threats
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days US communications regulator to create council to counter China technology threats Signal no longer cooperating with Ukraine on Russian cyberthreats, official says Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right …
…
continue reading

1
The tug-of-war over safety and free speech.
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for the third installment of our newest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show regularly to provide in-depth analysis on the latest policy developments shaping the cybersecurity and legal landscape. While this show…
…
continue reading

1
S16 E07 "Hackers Aren’t Breaking In—They’re Logging In"
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
…
continue reading

1
Can Donald Trump afford a trade war with Canada?
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57The world is bracing itself as Donald Trump enacts his global tariffs. As the president begins to enforce them upon the rest of the world, the Americast team assemble to ask whether Trump’s bet on tariffs might be a bad deal for the US. How have the markets reacted, and does Trump actually care? Plus, why has Donald Trump bought a Tesla even though…
…
continue reading
This week, Scott sat down with Lawfare Senior Editor and co-host emeritus Alan Rozenshtein and Lawfare Executive Editor Natalie Orpett to talk through the week’s big national security news, including: “Lowering the Bar.” Last week, the Trump administration took aim at two leading law firms—Covington & Burling and Perkins Coie—by repealing lawyers’ …
…
continue reading

1
The Counterfeit Problem: How Blockchain Is Revolutionizing Brand Protection - Noam Krasniansky - BSW #386
1:02:50
1:02:50
Play later
Play later
Lists
Like
Liked
1:02:50Noam Krasniansky, the visionary founder of Komposite Blockchain, joins Business Security Weekly to explore Web3's transformative potential. Noam delves into the basics of blockchain technology, Bitcoin and the meteoric rise of Ethereum, and the critical role of decentralized systems in safeguarding brands against counterfeiting—a global issue costi…
…
continue reading

1
The Counterfeit Problem: How Blockchain Is Revolutionizing Brand Protection - Noam Krasniansky - BSW #386
38:08
38:08
Play later
Play later
Lists
Like
Liked
38:08Noam Krasniansky, the visionary founder of Komposite Blockchain, joins Business Security Weekly to explore Web3's transformative potential. Noam delves into the basics of blockchain technology, Bitcoin and the meteoric rise of Ethereum, and the critical role of decentralized systems in safeguarding brands against counterfeiting—a global issue costi…
…
continue reading

1
New CISA head, Ballista botnet, PowerSchool breach report
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Sean Plankey nominated to head CISA Ballista Botnet hits TP-Link devices PowerSchool publishes breach report Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time chec…
…
continue reading

1
Risky Business #783 -- Evil webcam ransomwares entire Windows network
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news with special guest Rob Joyce, a Former Special Assistant to the US President and Director of Cybersecurity for NSA. They talk through: A realistic bluetooth-proximity phishing attack against Passkeys A very patient ransomware actor encrypts an entire enterprise …
…
continue reading

1
SN 1016: The Bluetooth Backdoor - North Korean Texans, Apple Pushes Back
2:56:45
2:56:45
Play later
Play later
Lists
Like
Liked
2:56:45Utah passes age verification requirement for app stores. The inside story on fake North Korean employees. Is that a Texas accent? An update on the ongoing Bybit cryptoheist saga. The industry may be making some changes in the wake of the Bybit attack. Apple pushes back legally against the UK's secret order. Did someone crack Passkeys? The UK launch…
…
continue reading
By Emmanuel Goldstein
…
continue reading
Geopolitical risk analyst Ian Bremmer joins FP Live to assess U.S. President Donald Trump’s first 50 days in office and how it is impacting the world. Suggested reading (FP links are paywall-free): Ravi Agrawal: Trump Is Ushering In a More Transactional World Daniel C. Kurtzer and Aaron David Miller: Lessons from the Trump-Zelensky Confrontation Ho…
…
continue reading

1
Brains, kill switch, parking fees, CobaltStrike, Minja, Allstate, GitHub, Josh Marpet - SWN #458
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Brains, kill switch, unpaid parking, Cobalt Strike, Minja, Allstate, GitHub, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-458
…
continue reading

1
Brains, kill switch, parking fees, CobaltStrike, Minja, Allstate, GitHub, Josh Marpet - SWN #458
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Brains, kill switch, unpaid parking, Cobalt Strike, Minja, Allstate, GitHub, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-458
…
continue reading