show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Artwork

1
Threat Status

The Washington Times

Unsubscribe
Unsubscribe
Weekly
 
An edgy and informative look at the biggest U.S. national security and geopolitical issues making headlines right now. Less about hot takes and more about depth, the Threat Status podcast is helmed by veteran Washington Times journalists Ben Wolfgang and Guy Taylor and features regular appearances by insiders with expertise on war, politics and global affairs.
  continue reading
 
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Unraveled is hosted by journalist Alexis Linkletter. Each season features a deep dive investigation into a case or issue. Season 1 covers the case of the Long Island Serial Killer. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork

1
The Silt Verses

Eskew Productions Ltd

Unsubscribe
Unsubscribe
Monthly
 
In this horror/fantasy serial drama, Carpenter and Faulkner, two worshippers of an outlawed god, travel up the length of their deity’s great black river, searching for holy revelations. As their pilgrimage lengthens and the river’s mysteries deepen, the two acolytes find themselves under threat from a police manhunt, but also come into conflict with the weirder gods that have flourished in these forgotten rural territories. Next episode drops 3rd June. Hosted on Acast. See acast.com/privacy ...
  continue reading
 
Our worst fears come true... on the home front. An ordinary woman is swept up into an extraordinary plot against America, by Russian domestic terrorists. She's overheard key details of the plot, but does not speak Russian... until she undergoes an experimental procedure, and becomes America's unlikely best chance against enemies hiding in plain sight.
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Artwork
 
Welcome to UFO...No! the podcast that covers the weird, the whacky and the obscure. We connect the dots that most people are too normal to connect! Are UFOs actually aliens or are they top secret technology? Is anal probing a real threat? We're a blend of "believers" or "skeptics," speculators of the unknown.
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork

1
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, a ...
  continue reading
 
Artwork
 
Totally Terrorism is a Pool Re Podcast - the UK's leading terrorism reinsurer. Each month the Pool Re threat analysis team speaks with a leading expert from the terrorism and counter-terrorism field about the threat posed by terrorism. Experts featured on the podcast include academics, policy makers, and practitioners amongst others, all with a distinct assessment or perspective of terrorism threat. The podcast will cover a range of topics including but not limited to: terrorist groups, terr ...
  continue reading
 
A new mystery thriller from the makers of Blackout and The Left Right Game, Last Known Position follows a group of experts including submersible pilot Mikaela Soto (Gina Rodriguez) as they seek to recover a flight that suddenly vanished over the Pacific Ocean. The super yacht sets off on what looks like an expedition funded by a grieving billionaire, William Cavanaugh (James Purefoy), to recover the flight that his wife and daughter were on. But the crew soon discovers that there's more to t ...
  continue reading
 
A dialogue with leaders in Cybersecurity and Third-Party Risk Management led a leader in the field: Gregory Rasner (author, "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" and "Zero Trust and Third-Party Risk: Reduce the Blast Radius")
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork
 
The Refuse Fascism podcast is an independent and all-volunteer show that produces weekly episodes that expose, analyze, and oppose the very real danger and threat of fascism coming to power in the United States. Hosted by Sam Goldman, produced by volunteers with Refuse Fascism.
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
Artwork

1
The Ontic Protective Intelligence Podcast

Ontic, The Ontic Center for Protective Intelligence

Unsubscribe
Unsubscribe
Weekly
 
Want a behind-the-scenes look into some of history’s most famous security incidents? Are you a corporate security professional looking to grow your understanding of the industry? Want to learn what it takes to break the bias as a woman in this field? The Ontic Protective Intelligence Podcast brings some of the greatest minds in safety, security, and protection together to shape how we view the industry's future.
  continue reading
 
Invested in Climate hosts conversations with leading thinkers to help our listeners do more to address the climate crisis through their Work, Investments, Learning, Lifestyle and Activism. People everywhere, communities, governments and all sectors of the economy are mobilizing to address climate change. The scale of this global action is unprecedented. Never before have so many people dedicated so much energy, creativity and capital to addressing a shared, global threat. Will it be enough? ...
  continue reading
 
Artwork

1
The Startup Podcast

Yaniv Bernstein, Chris Saad

Unsubscribe
Unsubscribe
Weekly+
 
A guide to the unique mindset and approach that drives Silicon Valley style disruption. Build product, raise money, and scale your startup like the best. TSP hosts Chris Saad and Yaniv Bernstein share practical advice based on decades of experience at Google, Uber, and their own startups.
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

Unsubscribe
Unsubscribe
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Artwork
 
The Illuminati - the infamous conspiratorial obsession - wasn't always that way. It was the work of one man that brought the illuminati from obscure to omnipresent - John Todd. In the 1970s, Todd burst into the public eye with tales of secret societies and dark rituals, claiming to be an ex-witch linked to human sacrifices among the elite. But as his tales spread and followers grew, his web of secrets unraveled, and ultimately - he vanished. 'Cover Up: The Conspiracy Tapes' exposes the twist ...
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Loading …
show series
 
Tom and Julie act out The Big Lugosi and watch clips of Roger Stone dancing and the mummy scene in Scavenger Hunt. Plus the comic strip HEATHCLIFF apparently came up with Summer Mummies before Tom and Julie did??? They reckon with the truth, Heathcliff vs Garfield, and much more. Also real life Space Jam, Lugosi guys vs Karloff guys, the sad end of…
  continue reading
 
Ben and Guy dive into new revelations about Iran's support for anti-Israel protests on American college campuses and offer an inside look at the recent NATO summit in Washington. Then, Andrew Hallman, former deputy director for digital innovation at the CIA, joins the show to talk about cyber and digital threats to the U.S., the rise of artificial …
  continue reading
 
In our latest episode of the Future of Threat Intelligence podcast, Mikko Hypponen, Chief Research Officer at WithSecure, explores the transformative role of AI in cybersecurity. Mikko shares his expert insights on how automation is revolutionizing detection and response strategies, such as being able to detect, craft a response, test it, implement…
  continue reading
 
Climate change is having a profound effect on agriculture. Farmers over the past decade have faced intensifying drought and heat stress on crops, leading many to wonder, what will agriculture look like 50 years from now? In May, at SciFri Live at Iowa State University in Ames, Iowa, Ira Flatow discussed the future of agriculture, and potential solu…
  continue reading
 
Text us feedback! In this episode, Spencer and Brad discuss the OpenSSH "regreSSHion" vulnerability. This is being tracked as CVE-2024-6409 & CVE-2024-6387. A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated,…
  continue reading
 
Welcome to The Daily Threat! In today’s episode, we cover three significant data breaches that highlight the ongoing challenges in protecting sensitive information. 1. 10 Billion Passwords Leaked Our first story comes from Infosecurity Magazine. A massive leak of 10 billion passwords underscores the critical importance of strong, unique passwords. …
  continue reading
 
Threat Hunting Workshop: Hunting for Command and Control 31 July 2024 | 12:00 - 1:00 pm ET Register Here! Black Hat 2024 Training with Lee Archinal "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs" Regular Registration closes on July 19, 2024! Secure your spot now at a discounted rate: 3-4 Aug 2024: Sign Up …
  continue reading
 
In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include: Scattered Spider leader reportedly arrested, as group pivot to target SaaS solutions ReliaQuest research into supply chain compromise. Detections to improve your resilience Classifying insider threat…
  continue reading
 
Are Amazon workers fighting the inevitable? Learn how founders, investors and industry leaders are responding to the big trends in AI. In this week's episode, Chris and Yaniv discuss: Amazon Warriors: The Amazon Labor Union have joined the Teamsters. But how will warehouse worker representation matter amidst rising automation and AI? A Common Threa…
  continue reading
 
On the 96th episode of the Triple Threat Theater podcast, Dax and Rian take a wrong turn in Tromaville.Films discussed on this episode:Class Of Nuke 'Em High (1986)Sgt. Kabukiman NYPD (1990)Tromeo And Juliet (1996)Follow Triple Threat Theater on social media:Twitter - @buy_borrow_burnInstagram - @triplethreattheaterpodcastTumblr - triplethreattheat…
  continue reading
 
We're talking about a girl named Josie who claims she saw a UFO in 1979 and later in the show we'll discuss Trump's assassination attempt, how the government manipulates data and more!! Support the Show. Thanks to the TIN FOIL MULISHA Become a member of the TIN FOIL MULISHA: https://www.ufonopodcast.net/tin-foil-mulisha Listen on all major platform…
  continue reading
 
This episode features interviews from the past two intense weeks... first Sam discusses recent events and updates from the intensifying situation in the US. Then, we share two interviews: first with Aziza Ahmed to discuss the implications of two years without Roe and recent SCOTUS rulings on abortion rights. Aziza is a professor of law at Boston Un…
  continue reading
 
In this week's update we look into the outcome of NATO's annual summit just wrapped up in Washington DC, including a scathing rebuke of China's material support for Russia's war on Ukraine, as well as joint PRC-Belarusian military exercises. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. Y…
  continue reading
 
As the James Webb Space Telescope marks two years of operations, NASA unveils a new image of two galaxies interacting. And, new research shows that cats’ tendency to scratch is affected by stress, certain kinds of play, and how active they are at night. Galaxies ‘Dance’ In Stunning New JWST Image The James Webb Space Telescope, the most powerful te…
  continue reading
 
Do you want to gain a deeper understanding of how PKI, AI, and cryptography are shaping software development? Our special guest is Loren Kohnfelder Loren Kohnfelder's journey into the world of AI and cybersecurity began with an early exposure to mainframe programming at the age of twelve. His fascination with software development grew from experime…
  continue reading
 
Critical Alert: Organizations using PHP in CGI mode must act now! CVE-2024-4577 presents a severe risk of remote code execution. With millions of websites potentially affected globally, immediate action is crucial. Attackers can exploit CGI argument injection to execute arbitrary commands, leading to unauthorized access or server compromise. Update…
  continue reading
 
There’s a little bit of Neanderthal in most of us. Neanderthals and Homo sapiens had a long history of intermingling, before the former went extinct about 40,000 years ago. That mixing means most modern humans have some amount of Neanderthal DNA—and it accounts for up to 3% of the genome in some people. While these genetic remnants don’t have much …
  continue reading
 
The Fated Four venture deeper into a magical dungeon and encounter many perplexing puzzles and challenging foes! The Land of Jir'Haniya is a vast and diverse land with many nations and cultures. In the east, an ancient order of Star-Readers has long foreseen the future and guided the many realms of the land towards peace and stability. But the orde…
  continue reading
 
The CYFIRMA team has uncovered "Kematian-Stealer," a sophisticated info stealer targeting Windows systems, hosted on GitHub. This open-source malware is designed to stealthily extract data from a wide range of sources, including browsers, cryptocurrency wallets, messaging apps, gaming platforms, VPNs, and email clients. Kematian-Stealer employs adv…
  continue reading
 
Where in the world are Adam and Cristian? In this episode, they’re coming to you live from São Paulo, Brazil, where they sat down with a special guest: Fernando Madureira. Fernando is the Global CISO of Cosan, a Brazilian conglomerate of several businesses spanning energy, transportation and logistics, and other sectors that operates around the wor…
  continue reading
 
In this episode of ShadowTalk, hosts Chris and Kim, along with Brian, discuss the latest news in cyber security and threat research. The influence of Generative Artificial Intelligence (GenAI) on cybercrime Tango down: Law enforcement takedown over 600 Cobalt Strike servers Record breaking DDoS attack disclosed by researchers Rockyou2024: 9.9 Billi…
  continue reading
 
Could the rise of robotics lead to reduced immigration in Western countries? Learn about the latest events that will affect your tech startup in this week's politically charged Reacts episode. Chris Saad and Yaniv Bernstein discuss: Bubble Wrap: A recent article from Sequoia summarizes the risks of a potential AI investment bubble and its implicati…
  continue reading
 
Fred Burton is joined by Jesse Leeds, the Global Head of Security and Crisis Management for Match Group, the parent company of popular dating platforms like Tinder, Hinge, OKCupid, and Plenty of Fish. With a career spanning roles at the CIA, FBI, and Bogaard Group International, Jesse brings a wealth of experience in security and crisis management.…
  continue reading
 
This year’s Olympic games come at a heightened moment for international conflict & terrorism. The potential for a jihadi group or individuals inspired by one to take the world’s attention with a potential attack or for Russia to try to embarrass France with acts of sabotage are very high. Link to the Research Report: Paris Olympics - CYFIRMA #Geopo…
  continue reading
 
Heuermann stands charged with the murders known as the Gilgo Four, but the refined MO associated with those killings leads many to believe they could not have been the killer’s first. We take a deep dive into some of the other unsolved cases in and around Long Island that sparked renewed interest in light of Heuermann’s arrest. Hosted on Acast. See…
  continue reading
 
These days, the 4th of July is known for its fireworks and cookouts. But the holiday commemorates the ratification of the Declaration of Independence, one of the most important founding documents of the United States. The Declaration of Independence, alongside the Emancipation Proclamation, the Constitution, and countless other documents, is housed…
  continue reading
 
Hello, Cyber Pirates! In today's episode of the Discarded Podcast, hosts Selena Larson and Tim Kromphardt are joined by Kyle Cucci, Staff Threat Researcher at Proofpoint. Dive with us into the world of cyber attacks as Kyle breaks down the intricacies of evasion techniques used by threat actors. From defense evasion to anti-sandboxing and anti-reve…
  continue reading
 
Join us for a conversation with Tanya Janka, also known as SheHacksPurple, as she discusses secure guardrails, the difference between guardrails and paved roads, and how to implement both in application security. Tanya, an award-winning public speaker and head of education at SEMGREP, shares her insights on creating secure software and teaching dev…
  continue reading
 
Hedge funds aren’t exactly known for contributing to climate progress or other ESG goals for that matter. So I was surprised to learn about Corbin Capital, a firm that aims to leverage the activist strategies of hedge funds not just to generate market-exceeding returns for their clients, but to advance environmental and social objectives. There are…
  continue reading
 
Earlier this year, the Smithsonian National Zoo in Washington announced that pandas would be returning to the capitol. This news was met with great fanfare because the zoo’s resident pandas had returned to China last fall, leaving the District panda-less for the first time in more than 50 years. After the pandas left D.C. in the fall, SciFri produc…
  continue reading
 
Impostor syndrome plagues many founders – but why? Founder and podcaster Mike Scott shares his own journey and the practical tools he's developed to overcome imposter syndrome. In this episode, Mike Scott (SMB Mastery, 'How to be Moderately Successful') joins Chris and Yaniv to discuss: Fool's Gold: Why impostor syndrome is common among founders, a…
  continue reading
 
Please enjoy this unlocked Patreon Livestream where Tom and Julie pit flowers vs flowers in a brutal deathmatch tournament to determine the Ultimate Flower! Plus lots more!! Patreon is the best way to support Double Threat! Your support keeps the show going and we appreciate it more than we can say. Plus you get weekly bonus episodes, access to mon…
  continue reading
 
In January 1975, 72-year-old George O'Barski encountered a bizarre craft near North Hudson Park in New Jersey, witnessing strange figures collecting soil and vegetation samples. Support the Show. Thanks to the TIN FOIL MULISHA Become a member of the TIN FOIL MULISHA: https://www.ufonopodcast.net/tin-foil-mulisha Listen on all major platforms: https…
  continue reading
 
Sam discusses the pivotal decision from the fascist-dominated Supreme Court to grant Trump permission to commit crimes through the immunity ruling this past year with historian Paul Street, along with the slew of other terrible rulings. Of course while this ruling would seem to green-light the current president to act as a king unbound by any rule …
  continue reading
 
Join me as I sit down with Pasquale and Bartosz, the organizers of PIVOTcon. In this episode, we'll delve into the fascinating origin story of this groundbreaking conference on Threat Research, which made its debut in May 2024 in the beautiful city of Malaga. Discover the inspiration, challenges, and triumphs, and learn why the art of coffee placem…
  continue reading
 
We love to hear from you! It's easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The frequency and scale of these incidents can make it seem like our digital world is und…
  continue reading
 
It’s officially summertime, and a new season of reading is here! Two science writers and voracious readers have compiled their summer reading recommendations, just for Science Friday fans. Before you head out for a week at the beach, start packing for that road trip, or stock up for a long staycation, we’ve got the list of science-y summer reads, s…
  continue reading
 
Loading …

Quick Reference Guide