show episodes
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Stay ahead of the game with our Cyber Threat Bulletin, your go-to source for the latest and most pressing cyber threats making headlines. From major data breaches and ransomware attacks to vulnerabilities in popular software and emerging threats, we've got you covered with all the information you need to stay protected in the ever-evolving world of cybersecurity. Tune in to our podcast and stay one step ahead of the hackers.
  continue reading
 
Podcasting icons Julie Klausner (Difficult People) and Tom Scharpling (The Best Show) team up for a fun show where they have fun and you have fun and everybody has fun. Each week, Tom and Julie careen through the best and worst of pop culture, giving the business to blockhead celebrities, rescuing shoddy podcasts, exploring obscure American subcultures, watching clips from the classics (The Munsters, Pee Wee’s Big Adventure, etc), and hanging out with amazing guests, all in the name of keepi ...
  continue reading
 
Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
S
Serious Danger

1
Serious Danger

Emerald Moon & Tom Ballard

Unsubscribe
Unsubscribe
Weekly+
 
Serious Danger is a podcast about our broken political system and its greatest threat: the Greens. Join traitorous SJWs Emerald Moon and Tom Ballard as they discuss the #auspol news of the week, chat to key figures from the left movement, and talk about how to win a future for all of us. This is NOT an official Greens party podcast, but it IS the official podcast of trying to not go insane while experiencing the sh*tshow that is Australian politics. / Produced by Michael Griffin / Twitter & ...
  continue reading
 
Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, a ...
  continue reading
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
  continue reading
 
The Bipartisan Commission on Biodefense is a privately funded entity established in 2014 to provide for a comprehensive assessment of the state of U.S. biodefense efforts and to issue recommendations that will foster change. From 2014-2015, the Commission convened four public meetings in Washington, DC on biological threat awareness, prevention and protection, surveillance and detection, and response and recovery. Current and former Members of Congress, former Administration officials, state ...
  continue reading
 
A new mystery thriller from the makers of Blackout and The Left Right Game, Last Known Position follows a group of experts including submersible pilot Mikaela Soto (Gina Rodriguez) as they seek to recover a flight that suddenly vanished over the Pacific Ocean. The super yacht sets off on what looks like an expedition funded by a grieving billionaire, William Cavanaugh (James Purefoy), to recover the flight that his wife and daughter were on. But the crew soon discovers that there's more to t ...
  continue reading
 
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
  continue reading
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Alex Wagner brings an enormous breadth of reporting experience to her new show, where she’ll cover news of the day, politics, and the cultural trends shaping our country and ourselves, leaving viewers with a better understanding of what’s happening in the world.
  continue reading
 
LIBERTY means freedom and justice for all, not a select few. However, Globalism and the rising Technocracy are posing a very real threat to our most fundamental freedoms. Follow Liberty Now to get the stories behind the headlines and interviews with people who are taking action as we expose the obstacles between us and true freedom.
  continue reading
 
Ridiculous Dialogue was created to share the banter that takes place at Imminent Threat Solutions on a daily basis. It’s us; candid, unedited and talking about everything from what movies we’re watching to the general geekiness that keeps us laughing here at ITS HQ. While we generally keep the vibe in our articles PG rated, be warned, it may not be safe to blast over your speakers at work. We hope you enjoy the insight into ITS and who we are behind the scenes as a company; pull up a chair a ...
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Kerr Ventures, and Robert Hurlbut is a Principal Application Security Archi ...
  continue reading
 
Loading …
show series
 
Tom and Julie recast The Avengers with David Lynch characters. They discuss the two most celebrated movies of 1987: Over The Top and Rent-a-Cop. Plus Woody Allen saves a life, Nick Adams vs Tim Robbins, and Harpo's big dong. Also Mario and Luigi, the Mamas & the Papas chain restaurants, Billy Joel vs NY Post, Upright Woke Mind Brigade, 50 Ways to P…
  continue reading
 
In this gripping episode of The Daily Threat, we uncover the hidden dangers lurking in the digital realm. Join us as we delve into the sinister world of chatbot injection attacks, where hackers manipulate AI chatbots to gain unauthorized access and exploit sensitive information. We also explore the risks and rewards of artificial intelligence in cy…
  continue reading
 
Welcome to the Cyber Threat Bulletin, where we keep you up to date on the latest cybersecurity threats and data breaches. Today's Topics: 1. QBot Malware Exploits Windows 10 WordPad DLL Hijacking Flaw 2. Zero-Day Vulnerability in Barracuda Email Security Gateway Exploited 3. ABB Confirms Ransomware Attack and Data Theft 4. Phishing Scams with Trave…
  continue reading
 
Ryan Tomcik, Dan Fenwick, and Tim Martin join host Luke McNamara to discuss how Managed Defense conducts proactive hunting, illustrated by several UNC961 intrusions. For more, please see: https://www.mandiant.com/resources/blog/unc961-multiverse-financially-motivated Follow Ryan @heferyzan and Tim @Sa1jak on Twitter.…
  continue reading
 
Drought and hotter summers are killing Germany’s spruce forests. They’re a staple of the timber industry but are proving unable to cope with the consequences of climate change. Four out of five of Germany’s trees show signs of sickness, according to the latest survey of the health of the country’s forests. All tree species are affected. And althoug…
  continue reading
 
OSINT - Open Source Intelligence: is the process of collecting and analyzing publicly available information in order to achieve some goal or facilitate some kind of action. OSINT can and is used for all sorts of things and it's applicable to virtually every industry. OSINT like many other things, can be used for good and it can be used for evil. Bu…
  continue reading
 
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCart…
  continue reading
 
On the 78th episode of the Triple Threat Theater podcast, Dax and Rian become absorbed in three monster movies.Films discussed on this episode:The Thing (1982)The Stuff (1985)The Blob (1988)Follow Triple Threat Theater on social media:Twitter - @buy_borrow_burnInstagram - @triplethreattheaterpodcastTumblr - triplethreattheater.tumblr.com…
  continue reading
 
A brief note on content for today's episode, we are going to be discussing or mentioning stalking, domestic abuse, and sex trafficking in today's show. If you’re a threat actor with a million dollar budget targeting high ranked targets like dissidents, activists, journalists and politicians, how do you do it? What if you’d like to stalk your neighb…
  continue reading
 
In the ever-evolving cybersecurity battlefield, organizations need to balance internal security tasks with outside expertise. That’s where hybrid hunting comes in – the powerful model that lets you divide security tasks between your internal team and an MSSP to create an unbeatable threat detection and response force. In this bonus episode, our exp…
  continue reading
 
In this Podcast, we'll be talking about "The impact of unauthorized access to large AI language models and their impact on the external threat landscape". Hackers have shown a growing interest in AI models such as ChatGPT, as they seek to exploit the technology for their criminal activities. The potential use of ChatGPT by cybercriminals is concern…
  continue reading
 
In this episode, we discuss the four-question framework for threat modeling with its creator, Adam Shostack. We dive deep into the meaning and purpose of each question and how they simplify the threat modeling process. The four questions are: 1) What are we working on? 2) What can go wrong? 3) What are we going to do about it? 4) Did we do a good j…
  continue reading
 
In this episode of ShadowTalk, host Chris Morgan is joined by Corey Carter and Ivan Righi to discuss: A day in the life of a Threat Engineer at ReliaQuest ALPHV leaking internal comm's related to victims incident response High Severity vulnerability affecting Veeam back servers exploited in the wild (CVE-2023-27532)…
  continue reading
 
Have you ever considered using an SBOM to inform your threat modeling? Tony Turner has. Tony joins us to discuss SBOMs, threat modeling, and the importance of Cyber Informed Engineering. Tony delves into the SBOM (Software Bill of Materials) concept, highlighting their value proposition in identifying vulnerabilities, demonstrating compliance with …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service