Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
We are a couple of computer geeks who are able to explain complex and confusing computer stuff in plain English.
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
Confidence in computing - security news from Symantec
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
Shirk, rest & play. "Top 50 Podcasts to Listen to on a Lockdown" (Sunday Times) "7th Most Essential podcast in the world" (Esquire magazine) "Genial babble... about nothing" (David Hepworth, The Guardian) "It'll never catch on." (Half-life) Living and loafing in South London with Dulwich Raider and Dirty South from leading slacker website, Deserter. It's only once a month, so don't get your hopes up.
The CS50 Podcast is hosted by CS50's own David J. Malan and Brian Yu at Harvard University. Each episode focuses on (and explains!) current events and news in tech and computer science more generally. This is the CS50 Podcast.
A new beginning in IT
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
Today in Security is a daily security news podcast that is hosted by certified IT professional Niki Depofi. Join Niko each morning to get a quick look at everything involving technology security on a day to day basis! This podcast is produced by TechJives.net / Chris Pope
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
Hacking, Computer Security, Technology, and Real Life. Video episodes: https://youtube.com/MalwareTechBlog
Hot takes on Pop Culture, Philosophy & Science by a few Ignoramus' See acast.com/privacy for privacy and opt-out information.
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
From the bleeding edge of science to the mysteries of the human mind, top-secret experiments and the remarkable stories of people, places and events just off the edge of the mainstream map, the creators of Stuff They Don’t Want You To Know bring you Strange News Daily – shedding light on the most bizarre, disturbing and unusual news of the day.
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
AI. Social Media. Blockchain. Gene-edited babies. Are these the greatest innovations in history or the greatest threat to humanity? Humanity, Wired makes sense of the human rights impact of technology today and tomorrow. Host Amy Lehr, Human Rights Initiative director at the Center for Strategic and International Studies (CSIS) in Washington D.C., sits down with human rights defenders, policymakers and technologists to discuss how to make technology work for us, not against us.
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
T
The CyberWire Daily


1
Trickbot may be down, but can we count it out? [Research Saturday]
21:03
21:03
Play later
Play later
Lists
Like
Liked
21:03
Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs we…
T
The CyberWire Daily


1
Implications of Solorigate’s circumspection. RBNZ cleans data sources. Gamarue in student laptops. Dodgy apps. Ransom DDoS surges. Securing the President’s Peloton.
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01
Twice, it’s maybe an indicator. Once, it’s nuthin’ at all...to the machines. The Reserve Bank of New Zealand works to clean up its data sources. Wormy student laptops. Daily Food Diary is a glutton for your data. Ransom DDoS. Caleb Barlow examines how we handle disinformation in our runbooks and response plans. Our guest Ron Gula from Gula Tech Adv…
T
The CyberWire Daily


1
Solorigate’s stealthy, careful operators. LuckyBoy malvertising. BEC as reconnaissance? Remote work and leaky sites. And good riddance to the Joker’s Stash.
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05
Microsoft researchers detail the lengths to which the Solorigate threat actor went to stay undetected and establish persistence. LuckyBoy malvertising is described. Business email compromise as a reconnaissance technique? More reminders about the risks that accompany remote work. Ben Yelin looks at cyber policy issues facing the Biden administratio…
C
Cyber Humanity


1
32: Breaches, Damned Breaches, and Statistics
53:25
53:25
Play later
Play later
Lists
Like
Liked
53:25
SolarWinds and SUNBURST are still consuming the Infosec community and a few things have happened since our last episode. Since the Department of Justice has admitted that they were breached and that email inboxes were accessed, Kev tells us just how bad it is. We cover the saga from all angles, from Jetbrains to attribution and techniques to stock …
T
The CyberWire Daily


1
More on that Solorigate threat actor, especially its non-SolarWinds activity. Chimera’s new target list. Executive Order on reducing IaaS exploitation. The case of the stolen laptop.
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02
Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump’s last Executive Order addresses foreign exploitation of Infrastruct…
S
Security Now (Audio)


1
SN 802: Where the Plaintext Is - 2021's First Patch Tuesday, Titan Security Key Side-Channel Attack, WhatsApp
1:45:54
1:45:54
Play later
Play later
Lists
Like
Liked
1:45:54
2021's first Patch Tuesday, Titan Security Key side-channel attack, WhatsApp. When is Chrome not Chromium? A major DuckDuckGo milestone. Project Zero in the wild. First Patch Tuesday of 2021. ZeroLogon Drop Dead. NSA warns against outsourcing DoH services. A Side-Channel in Titan. The "PayPal Football" WhatsApp's decision to bring its data into Fac…
S
Security Now (Video)


1
SN 802: Where the Plaintext Is - 2021's First Patch Tuesday, Titan Security Key Side-Channel Attack, WhatsApp
1:45:54
1:45:54
Play later
Play later
Lists
Like
Liked
1:45:54
2021's first Patch Tuesday, Titan Security Key side-channel attack, WhatsApp. When is Chrome not Chromium? A major DuckDuckGo milestone. Project Zero in the wild. First Patch Tuesday of 2021. ZeroLogon Drop Dead. NSA warns against outsourcing DoH services. A Side-Channel in Titan. The "PayPal Football" WhatsApp's decision to bring its data into Fac…
T
The CyberWire Daily


1
EMA emails altered before release in apparent disinformation effort. Vishing rising. Another backdoor found in SolarWinds supply chain campaign. An arrest and a stolen laptop.
23:05
23:05
Play later
Play later
Lists
Like
Liked
23:05
The European Medicines Agency says stolen emails about vaccine development were altered before being dumped online. Another backdoor is found associated with the SolarWinds supply chain campaign. DNS cache poisoning vulnerabilities are described. FBI renews warnings about vishing. Iran’s “Enemies of the People” disinformation campaign. Vishing is u…
T
The CyberWire Daily


1
Encore: You will pay for that one way or another. [Caveat]
36:09
36:09
Play later
Play later
Lists
Like
Liked
36:09
Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails. W…
T
The CyberWire Daily


1
Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47
Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersec…
T
The CyberWire Daily


1
Manufacturing sector is increasingly a target for adversaries. [Research Saturday]
25:47
25:47
Play later
Play later
Lists
Like
Liked
25:47
Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and proc…
T
The CyberWire Daily


1
Charming Kitten’s smishing and phishing. Solorigate updates. Supply chain attacks and the convergence of espionage and crime. Greed-bait. Ring patches bug. Best practices from NSA, CISA.
26:01
26:01
Play later
Play later
Lists
Like
Liked
26:01
Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best p…
T
The CyberWire Daily


1
SideWinder and South Asian cyberespionage. Project Zero and motivation to patch. CISA’s advice for cloud security. Classiscam in the criminal-to-criminal market. SolarLeaks misdirection?
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19
There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service aff…
D
Deserter Pubcast


1
When Pubs Cry: chips, crisps, football & pubs plus guests, James Dowdeswell & Feebs from France.
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50
In this episode:What we did nextNon-league football: last game at Dulwich Hamlet Last orders at the BlythePub of the dayShirk, Rest and PlayDeserter IPABrixton Buzz prize drawGuest: James Dowdeswell on lockdown drinkingPub and beer newsThe elephant's journeyBrixton BookJamDulwich Hamlet Comedy ClubCrisp newsGuest: Feebs from FranceBum DosserSocial …
T
The CyberWire Daily


1
Looking for that threat actor “likely based in Russia.” SolarLeaks and a probably bogus offer of stolen files. Notes on Patch Tuesday.
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21
Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell …
S
Security Now (Audio)


1
SN 801: Out With The Old - SolarWinds Smoking Gun, Signal Influx of WhatsApp Users, Male Chastity Cage
2:00:15
2:00:15
Play later
Play later
Lists
Like
Liked
2:00:15
SolarWinds smoking gun, Signal influx of WhatsApp users, male chastity cage. Firefox and Chromium updates address remote system take over bugs. Tenable researchers reported a critical Chromium bug. What Firefox's backspace key does and should do. How Ryuk malware operations netted $150 million via cryptocurrency exchange. Intel: A triumph of market…
S
Security Now (Video)


1
SN 801: Out With The Old - SolarWinds Smoking Gun, Signal Influx of WhatsApp Users, Male Chastity Cage
2:00:14
2:00:14
Play later
Play later
Lists
Like
Liked
2:00:14
SolarWinds smoking gun, Signal influx of WhatsApp users, male chastity cage. Firefox and Chromium updates address remote system take over bugs. Tenable researchers reported a critical Chromium bug. What Firefox's backspace key does and should do. How Ryuk malware operations netted $150 million via cryptocurrency exchange. Intel: A triumph of market…
T
The CyberWire Daily


1
Cyberespionage campaign hits Colombia. New malware found in the SolarWinds incident. Mimecast certificates compromised. Ubiquiti tells users to reset passwords. Two wins for the good guys.
24:26
24:26
Play later
Play later
Lists
Like
Liked
24:26
A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief…
T
The CyberWire Daily


1
More (ambiguous) evidence for attribution of Solorigate. CISA expands incident response advice. Inspiration, investigation, and deplatforming: notes from the Capitol Hill riot.
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32
Similarities are found between Sunburst backdoor code and malware used by Turla. CISA expands advice on dealing with Solorigate. Courts revert to paper...and USB drives. More members of the US Congress report devices stolen during last week’s riot. Online inspiration for violence seems distributed, not centralized. Caleb Barlow examines protocols f…
T
The CyberWire Daily


1
Tom Gorup: Fail fast and fail forward. [Operations] [Career Notes]
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29
Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army…
T
The CyberWire Daily


1
Emotet reemerges and becomes one of most prolific threat groups out there. [Research Saturday]
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50
Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle. Emotet, the largest malware botnet today, starte…
T
The CyberWire Daily


1
The Solorigate cyberespionage campaign and sensitive corporate data. The cybersecurity implications of physical access during the Capitol Hill riot. Ransomware’s successful business model.
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36
Solorigate and its effect on sensitive corporate information. The DC riots show the cybersecurity consequences of brute physical access to systems. A North Korean APT resurfaces with the RokRat Trojan. Ransomware remains very lucrative, and why? Because people continue to pay up. Thomas Etheridge from CrowdStrike on The Role of Outside Counsel in t…
T
The CyberWire Daily


1
CISA updates its alerts and directives concerning Solorigate as the investigation expands. Rioting, social media, and cybersecurity.
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41
CISA updates its guidance on Solorigate, and issues an alert that the threat actor may have used attack vectors other than the much-discussed SolarWinds backdoor. Some reports suggest that a widely used development tool produced by a Czech firm may have been compromised. The cyberespionage campaign is now known to have extended to the Department of…