Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Talion Threat Set Radio is your weekly cyber threat intelligence bulletin. We cut through the noise to give you our honest opinion on the threat news that matters.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
3 Movies. 2 Friends. 1 Podcast. Join Joe Daxberger and Rian Miller as they review and rank 3 thematically linked movies per episode of the Triple Threat Theater Podcast.
…
continue reading
The OFFICIAL podcast of Film Threat!
…
continue reading
D
DISCARDED: Tales From the Threat Research Trenches


1
DISCARDED: Tales From the Threat Research Trenches
Proofpoint
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Stay ahead of the game with our Cyber Threat Bulletin, your go-to source for the latest and most pressing cyber threats making headlines. From major data breaches and ransomware attacks to vulnerabilities in popular software and emerging threats, we've got you covered with all the information you need to stay protected in the ever-evolving world of cybersecurity. Tune in to our podcast and stay one step ahead of the hackers.
…
continue reading
D
Double Threat with Julie Klausner & Tom Scharpling


1
Double Threat with Julie Klausner & Tom Scharpling
Forever Dog
Podcasting icons Julie Klausner (Difficult People) and Tom Scharpling (The Best Show) team up for a fun show where they have fun and you have fun and everybody has fun. Each week, Tom and Julie careen through the best and worst of pop culture, giving the business to blockhead celebrities, rescuing shoddy podcasts, exploring obscure American subcultures, watching clips from the classics (The Munsters, Pee Wee’s Big Adventure, etc), and hanging out with amazing guests, all in the name of keepi ...
…
continue reading
Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
…
continue reading
A dialogue with leaders in Cybersecurity and Third-Party Risk Management led by two leaders in the field:Gregory Rasner (author, "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting") Alexander Mulnick ("ThatThirdPartyGuy.com" and VP, Cybersecurity Third Party Risk at Truist).
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics.
…
continue reading
Sibylline is a leading strategic risk and threat advisory firm. We support businesses, governments and NGOs through the provision of high-quality threat-based analysis and services.
…
continue reading
Host Matthew Allen along with co-hosts Wyn Brantley and Ryan Fox discuss wrestling topics from the past, present, and future.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
The BBC brings you all the week's science news.
…
continue reading
T
The Bid Picture - Cybersecurity & Intelligence Analysis


1
The Bid Picture - Cybersecurity & Intelligence Analysis
Bidemi Ologunde
A podcast that features news, facts, some opinion, and conversations with guests on the day-to-day implications of cybersecurity.
…
continue reading
Do watch
…
continue reading
Serious Danger is a podcast about our broken political system and its greatest threat: the Greens. Join traitorous SJWs Emerald Moon and Tom Ballard as they discuss the #auspol news of the week, chat to key figures from the left movement, and talk about how to win a future for all of us. This is NOT an official Greens party podcast, but it IS the official podcast of trying to not go insane while experiencing the sh*tshow that is Australian politics. / Produced by Michael Griffin / Twitter & ...
…
continue reading
O
Out of the Woods: The Threat Hunting Podcast


1
Out of the Woods: The Threat Hunting Podcast
Out of the Woods: The Threat Hunting Podcast
Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, a ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
…
continue reading
B
Bipartisan Commission on Biodefense


1
Bipartisan Commission on Biodefense
Bipartisan Commission on Biodefense
The Bipartisan Commission on Biodefense is a privately funded entity established in 2014 to provide for a comprehensive assessment of the state of U.S. biodefense efforts and to issue recommendations that will foster change. From 2014-2015, the Commission convened four public meetings in Washington, DC on biological threat awareness, prevention and protection, surveillance and detection, and response and recovery. Current and former Members of Congress, former Administration officials, state ...
…
continue reading
A new mystery thriller from the makers of Blackout and The Left Right Game, Last Known Position follows a group of experts including submersible pilot Mikaela Soto (Gina Rodriguez) as they seek to recover a flight that suddenly vanished over the Pacific Ocean. The super yacht sets off on what looks like an expedition funded by a grieving billionaire, William Cavanaugh (James Purefoy), to recover the flight that his wife and daughter were on. But the crew soon discovers that there's more to t ...
…
continue reading
D
DEATH Labs: Cyber Threats and Research by Netenrich


Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Alex Wagner brings an enormous breadth of reporting experience to her new show, where she’ll cover news of the day, politics, and the cultural trends shaping our country and ourselves, leaving viewers with a better understanding of what’s happening in the world.
…
continue reading
A podcast about the intersection of technology and storytelling featuring screenwriter Julie Bush.
…
continue reading
T
Tolerable Risk: Threats and Opportunities in the 3rd Sector


1
Tolerable Risk: Threats and Opportunities in the 3rd Sector
Sabrina M. Segal
Join Sabrina as she explores the integrity, risk, and compliance world as it applies to charities, nonprofits, and NGOs in the 3rd sector. Follow Sabrina on LinkedIn to get new episode announcements and join the conversation. https://www.linkedin.com/in/smsegal/
…
continue reading
A window into our world - investigating, exploring and telling stories from everywhere. Original BBC documentary storytelling, bringing the globe to your ears.
…
continue reading
LIBERTY means freedom and justice for all, not a select few. However, Globalism and the rising Technocracy are posing a very real threat to our most fundamental freedoms. Follow Liberty Now to get the stories behind the headlines and interviews with people who are taking action as we expose the obstacles between us and true freedom.
…
continue reading
Global experts and decision makers discuss, debate and analyse a key news story.
…
continue reading
A disability support program between two friends in wheelchairs discussing their daily lives and critiquing depictions of the crippled experience in popular culture.
…
continue reading
In-depth, hard-hitting interviews with newsworthy personalities.
…
continue reading
Ridiculous Dialogue was created to share the banter that takes place at Imminent Threat Solutions on a daily basis. It’s us; candid, unedited and talking about everything from what movies we’re watching to the general geekiness that keeps us laughing here at ITS HQ. While we generally keep the vibe in our articles PG rated, be warned, it may not be safe to blast over your speakers at work. We hope you enjoy the insight into ITS and who we are behind the scenes as a company; pull up a chair a ...
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Kerr Ventures, and Robert Hurlbut is a Principal Application Security Archi ...
…
continue reading
A weekly podcast featuring the leading thinkers in business and management.
…
continue reading
Age of Reason is a channel that promotes positive Atheism, knowledge and common sense... and now I mostly talk about Climate Change because I strongly believe this is the one existential threat that endangers us all.
…
continue reading
Every day there are people in our local and global community who are using the tactics and principles of nonviolence to transform the world around us. Our podcast focuses on telling these stories to highlight those who are joining us in our journey to create a world free from violence and the threat of violence.
…
continue reading
Tom and Julie recast The Avengers with David Lynch characters. They discuss the two most celebrated movies of 1987: Over The Top and Rent-a-Cop. Plus Woody Allen saves a life, Nick Adams vs Tim Robbins, and Harpo's big dong. Also Mario and Luigi, the Mamas & the Papas chain restaurants, Billy Joel vs NY Post, Upright Woke Mind Brigade, 50 Ways to P…
…
continue reading
T
The Daily Threat


1
Chatbot Injection Attacks, AI Risks, and Cybersecurity Best Practices
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06
In this gripping episode of The Daily Threat, we uncover the hidden dangers lurking in the digital realm. Join us as we delve into the sinister world of chatbot injection attacks, where hackers manipulate AI chatbots to gain unauthorized access and exploit sensitive information. We also explore the risks and rewards of artificial intelligence in cy…
…
continue reading
Welcome to the Cyber Threat Bulletin, where we keep you up to date on the latest cybersecurity threats and data breaches. Today's Topics: 1. QBot Malware Exploits Windows 10 WordPad DLL Hijacking Flaw 2. Zero-Day Vulnerability in Barracuda Email Security Gateway Exploited 3. ABB Confirms Ransomware Attack and Data Theft 4. Phishing Scams with Trave…
…
continue reading
F
Film Threat


1
The Little Mermaid + Kandahar + The Machine + Chop & Steele
3:12:39
3:12:39
Play later
Play later
Lists
Like
Liked
3:12:39
Will The Little Mermaid sink or swim at the box office? Plus reviews of new movies Kandahar and The Machine. And an interview with Chop & Steele documentary subjects and founders of the Found Footage Festival Joe Pickett and Nick Prueher. Hilarity ensues.By Film Threat Podcast Network
…
continue reading
T
The Defender's Advantage Podcast


1
Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20
Ryan Tomcik, Dan Fenwick, and Tim Martin join host Luke McNamara to discuss how Managed Defense conducts proactive hunting, illustrated by several UNC961 intrusions. For more, please see: https://www.mandiant.com/resources/blog/unc961-multiverse-financially-motivated Follow Ryan @heferyzan and Tim @Sa1jak on Twitter.…
…
continue reading
Drought and hotter summers are killing Germany’s spruce forests. They’re a staple of the timber industry but are proving unable to cope with the consequences of climate change. Four out of five of Germany’s trees show signs of sickness, according to the latest survey of the health of the country’s forests. All tree species are affected. And althoug…
…
continue reading
T
The Cyber Threat Perspective


1
Episode 42: OSINT - What You Don't Know Can Hurt You
34:07
34:07
Play later
Play later
Lists
Like
Liked
34:07
OSINT - Open Source Intelligence: is the process of collecting and analyzing publicly available information in order to achieve some goal or facilitate some kind of action. OSINT can and is used for all sorts of things and it's applicable to virtually every industry. OSINT like many other things, can be used for good and it can be used for evil. Bu…
…
continue reading
Tool which allows extraction of KeePass master password publicly available. Geacon, an open source Cobalt Strike port usable on MacOS, sees spike in use. Report outlines Microsoft Teams functions which can enable phishing and more.By Talion Threat Intelligence Team
…
continue reading
D
DEATH Labs: Cyber Threats and Research by Netenrich


1
Threat Actors and Making DNS Fail Harder and at Greater Scale than Ever Before
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCart…
…
continue reading
On the 78th episode of the Triple Threat Theater podcast, Dax and Rian become absorbed in three monster movies.Films discussed on this episode:The Thing (1982)The Stuff (1985)The Blob (1988)Follow Triple Threat Theater on social media:Twitter - @buy_borrow_burnInstagram - @triplethreattheaterpodcastTumblr - triplethreattheater.tumblr.com…
…
continue reading
A
Alex Wagner Tonight


1
White House keeps positive face on debt ceiling despite GOP threats
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28
...Plus, Crucial local elections take shape in Kentucky and PennsylvaniaBy NBC News
…
continue reading
D
DISCARDED: Tales From the Threat Research Trenches


1
The Spies and Stalkers of Surveillance Capitalism
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14
A brief note on content for today's episode, we are going to be discussing or mentioning stalking, domestic abuse, and sex trafficking in today's show. If you’re a threat actor with a million dollar budget targeting high ranked targets like dissidents, activists, journalists and politicians, how do you do it? What if you’d like to stalk your neighb…
…
continue reading
T
Tolerable Risk: Threats and Opportunities in the 3rd Sector


1
Episode 12: S2 E12 - Tolerable Risk - Andy Kovacs - Improving Audit Communications
56:24
56:24
Play later
Play later
Lists
Like
Liked
56:24
Join Sabrina as she speaks with Andy Kovacs, The Audit and Leadership Communications Guy!, and they discuss the myriad of ways you can improve your audit communications.
…
continue reading
In the ever-evolving cybersecurity battlefield, organizations need to balance internal security tasks with outside expertise. That’s where hybrid hunting comes in – the powerful model that lets you divide security tasks between your internal team and an MSSP to create an unbeatable threat detection and response force. In this bonus episode, our exp…
…
continue reading
C
CYFIRMA Research


1
CYFIRMA Research - Episode 003: The impact of unauthorized access to large AI language models and their impact on the external threat landscape
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55
In this Podcast, we'll be talking about "The impact of unauthorized access to large AI language models and their impact on the external threat landscape". Hackers have shown a growing interest in AI models such as ChatGPT, as they seek to exploit the technology for their criminal activities. The potential use of ChatGPT by cybercriminals is concern…
…
continue reading
T
The Threat Modeling Podcast


1
The Four Question Framework with Adam Shostack
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37
In this episode, we discuss the four-question framework for threat modeling with its creator, Adam Shostack. We dive deep into the meaning and purpose of each question and how they simplify the threat modeling process. The four questions are: 1) What are we working on? 2) What can go wrong? 3) What are we going to do about it? 4) Did we do a good j…
…
continue reading
S
ShadowTalk powered by ReliaQuest


1
Weekly: ReliaQuest Threat Management, ALPHV, Veeam Vulnerability Exploited
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39
In this episode of ShadowTalk, host Chris Morgan is joined by Corey Carter and Ivan Righi to discuss: A day in the life of a Threat Engineer at ReliaQuest ALPHV leaking internal comm's related to victims incident response High Severity vulnerability affecting Veeam back servers exploited in the wild (CVE-2023-27532)…
…
continue reading
Have you ever considered using an SBOM to inform your threat modeling? Tony Turner has. Tony joins us to discuss SBOMs, threat modeling, and the importance of Cyber Informed Engineering. Tony delves into the SBOM (Software Bill of Materials) concept, highlighting their value proposition in identifying vulnerabilities, demonstrating compliance with …
…
continue reading
T
Third Party Threat Hunters

1
S1E5: TPTHunters with Rob Wood (CISO of Medicare/Medicaid)
31:25
31:25
Play later
Play later
Lists
Like
Liked
31:25
In this episode, we've got Rob Wood, as the CISO from Medicare/Medicaid, whose passion around third-party risk and cybersecurity is unmatched. Learn how many of us are 'doing it wrong' and get some great soft-skills discussions.By Gregory Rasner
…
continue reading