show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Our worst fears come true... on the home front. An ordinary woman is swept up into an extraordinary plot against America, by Russian domestic terrorists. She's overheard key details of the plot, but does not speak Russian... until she undergoes an experimental procedure, and becomes America's unlikely best chance against enemies hiding in plain sight.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Artwork

1
Threat Status

The Washington Times

Unsubscribe
Unsubscribe
Weekly
 
An edgy and informative look at the biggest U.S. national security and geopolitical issues making headlines right now. Less about hot takes and more about depth, the Threat Status podcast is helmed by veteran Washington Times journalists Ben Wolfgang and Guy Taylor and features regular appearances by insiders with expertise on war, politics and global affairs.
  continue reading
 
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
Unraveled is hosted by journalist Alexis Linkletter. Each season features a deep dive investigation into a case or issue. Season 1 covers the case of the Long Island Serial Killer. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks Unit 42 and N2K Networks

Unsubscribe
Unsubscribe
Monthly+
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something. Chris Romeo is the CEO of Devici (THE Threat Modeling Company) and a General Partner at Kerr Ventures.
  continue reading
 
Artwork

1
Flashpoint

Tenderfoot TV and iHeartPodcasts

Unsubscribe
Unsubscribe
Weekly
 
On July 27th, 1996, a domestic terrorist bombed the Summer Olympic Games held in Atlanta, GA. While the FBI and the media fixated on the wrong man, the bomber planned his next, more overtly political attacks on 2 abortion clinics and a gay nightclub. The bomber would later be identified as a dedicated soldier in the white-supremacist Christian Identity Movement. Through the lens of these 4 bombings, and the victims left to pick up the pieces, Flashpoint explores America's greatest threat, th ...
  continue reading
 
Artwork

1
The Silt Verses

Eskew Productions Ltd

Unsubscribe
Unsubscribe
Monthly
 
In this horror/fantasy serial drama, Carpenter and Faulkner, two worshippers of an outlawed god, travel up the length of their deity’s great black river, searching for holy revelations. As their pilgrimage lengthens and the river’s mysteries deepen, the two acolytes find themselves under threat from a police manhunt, but also come into conflict with the weirder gods that have flourished in these forgotten rural territories. Next episode drops 3rd June. Hosted on Acast. See acast.com/privacy ...
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork
 
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Artwork

1
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, a ...
  continue reading
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
A new mystery thriller from the makers of Blackout and The Left Right Game, Last Known Position follows a group of experts including submersible pilot Mikaela Soto (Gina Rodriguez) as they seek to recover a flight that suddenly vanished over the Pacific Ocean. The super yacht sets off on what looks like an expedition funded by a grieving billionaire, William Cavanaugh (James Purefoy), to recover the flight that his wife and daughter were on. But the crew soon discovers that there's more to t ...
  continue reading
 
Welcome to UFO...No! the podcast that covers the weird, the whacky and the obscure. We connect the dots that most people are too normal to connect! Are UFOs actually aliens or are they top secret technology? Is anal probing a real threat? We're a blend of "believers" or "skeptics," speculators of the unknown
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Artwork
 
The Refuse Fascism podcast is an independent and all-volunteer show that produces weekly episodes that expose, analyze, and oppose the very real danger and threat of fascism coming to power in the United States. Hosted by Sam Goldman, produced by volunteers with Refuse Fascism.
  continue reading
 
Artwork

1
The Ontic Protective Intelligence Podcast

Ontic, The Ontic Center for Protective Intelligence

Unsubscribe
Unsubscribe
Weekly
 
Want a behind-the-scenes look into some of history’s most famous security incidents? Are you a corporate security professional looking to grow your understanding of the industry? Want to learn what it takes to break the bias as a woman in this field? The Ontic Protective Intelligence Podcast brings some of the greatest minds in safety, security, and protection together to shape how we view the industry's future.
  continue reading
 
Artwork
 
The Illuminati - the infamous conspiratorial obsession - wasn't always that way. It was the work of one man that brought the illuminati from obscure to omnipresent - John Todd. In the 1970s, Todd burst into the public eye with tales of secret societies and dark rituals, claiming to be an ex-witch linked to human sacrifices among the elite. But as his tales spread and followers grew, his web of secrets unraveled, and ultimately - he vanished. 'Cover Up: The Conspiracy Tapes' exposes the twist ...
  continue reading
 
Artwork

51
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Loading …
show series
 
Ben and Guy discuss Indian Prime Minister Narendra Modi's high-stakes trip to Kyiv, foreign policy (or the lack thereof) at the Democratic National Convention, and how elite Iranian military units are allegedly spearheading a state-sponsored hacking campaign targeting the U.S. presidential election. Then, former CIA official Dan Hoffman joins the s…
  continue reading
 
🛡️In today’s episode of The Daily Threat, we dive into three critical cybersecurity stories every business leader needs to know: 🚨British Intelligence Tipping Off Ransomware Targets - https://therecord.media/british-intelligence-tipping-off-ransomware-targets 🚨U.S. Space Industry Under Cyber Espionage Threat - https://www.infosecurity-magazine.com/…
  continue reading
 
In our latest episode of the Future of Threat Intelligence podcast, we speak with Drew Simonis, Chief Information Security Officer at Juniper Networks. Drew shares his insights into the evolving landscape of cybersecurity, emphasizing the crucial role of empathy and humility in effective leadership. He also explores the transformative potential of …
  continue reading
 
In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, engages with Jamie Fitz-Gerald, Sr. Director of Product Management at Okta, to delve into the transformative world of identity security. They explore the critical role of identity as the new perimeter in today’s hybrid work environment, emphasizing the …
  continue reading
 
On the 98th episode of the Triple Threat Theater podcast, Dax and Rian wear ponchos to sit in the splatter zone.Films discussed on this episode:Street Trash (1987)Society (1989)Body Melt (1993)Follow Triple Threat Theater on social media:Twitter - @buy_borrow_burnInstagram - @triplethreattheaterpodcastTumblr - triplethreattheater.tumblr.com…
  continue reading
 
Text us feedback! In this episode Brad and Spencer discuss Attack Surface Monitoring, what it is, and why it's important for defending against cyber-attacks. They give into the difference between attack vectors and attack surface and share a high-level overview on how to go about monitoring your own attack surface. Finally, they share tools and tec…
  continue reading
 
Hello, cyber rebels! Ever wondered what lightsabers, the Force, and intergalactic battles have in common with the world of cybersecurity? Welcome to a special episode of the Discarded Podcast. Join host Selena and co-host Greg Lesnewich, Senior Threat Researcher at Proofpoint, along with our guest, Eric Geller, cybersecurity reporter and host of th…
  continue reading
 
In this week's Top 5 Threat Hunting Headlines, Scott and Tom discuss top cybersecurity threats, including Kaspersky's Tusk InfoStealer campaign, a cloud extortion campaign exploiting AWS environments, APT41's advanced tactics against a Taiwanese research institute, and the Banshee InfoStealer targeting macOS. They also explore the impact of AI on c…
  continue reading
 
Tom and Julie learn How To Make Trippy Music from the internet's foremost expert. Plus Raygun's even less talented breakdancing husband, the Waterbed Ranch, a draft email to William Sadler's reps, and a very important announcement... HOW WAS YOUR WEEK RETURNS FALL 2024! SIGN UP FOR THE PATREON NOW: https://www.patreon.com/HowWasYourWeek CLIPS FROM …
  continue reading
 
In this episode of the Threat Modeling Podcast, host Chris Romeo takes listeners on a journey through the intricate world of threat modeling. Joined by senior security consultant Gavin Klondike, the episode delves into Gavin's experiences and insights into threat modeling, particularly in the context of artificial intelligence and machine learning.…
  continue reading
 
In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan Righi, discuss the latest news in cyber security and threat research. Topics this week include: Rise of the Deepfakes: Threat actors target Ferrari, Fake North Korean IT worker fake's job interview Developments in ransomware: Stormous v3, VSXI, Black Basta develop custom malware Re…
  continue reading
 
In this week's update, we look into a mass stabbing incident at a public festival and concert in Solingen, Germany. We then explore the details surrounding possible Russian sabotage efforts at a key NATO air base, also in Germany. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subs…
  continue reading
 
In this conversation, I discuss various topics including the US Army's failed $11 million marketing deal with the UFL and Dwayne 'The Rock' Johnson, the state of ransomware in state and local government organizations, the Mimecast Global Threat Intelligence Report, the reliance on a few tech companies for critical aspects of the economy, the need f…
  continue reading
 
Send us a Text Message. Dave Lewis, the global advisory CISO at OnePassword, shares his fascinating journey from the music industry to a thriving career in cybersecurity. With a background in music and a natural curiosity for computers, Dave's unconventional path highlights the diverse entry points into the cybersecurity field. His extensive experi…
  continue reading
 
Chatted with Joe Carlsmith about whether we can trust power/techno-capital, how to not end up like Stalin in our urge to control the future, gentleness towards the artificial Other, and much more. Check out Joe's sequence on Otherness and Control in the Age of AGI here. Watch on YouTube. Listen on Apple Podcasts, Spotify, or any other podcast platf…
  continue reading
 
The Fated Four must navigate a magical maze filled with Intellect Devourers, Shield Guardians, and even more terrifying foes... The Land of Jir'Haniya is a vast and diverse land with many nations and cultures. In the east, an ancient order of Star-Readers has long foreseen the future and guided the many realms of the land towards peace and stabilit…
  continue reading
 
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
  continue reading
 
Five years into this manhunt, he finally makes a mistake. And we take a look back into the not-so-ordinary childhood and coming of age of a homegrown, far-right, religious domestic terrorist. Want to dive deeper? Follow @flashpoint_podcast on Instagram. For new releases and updates follow @tenderfoot.tv on social media. Subscribe to Tenderfoot+ for…
  continue reading
 
CYFIRMA research team’s latest report explores the tactics of hacktivists - ransomware variants, stealer logs, and strategic alliances - and examines their motivations; be they geopolitical, financial, cultural, or racial. It also shows how social media is being leveraged for recruitment, coordination, and monetization via theft or extortion, what …
  continue reading
 
In today’s episode of The Daily Threat, we dive into three critical cybersecurity stories that every business leader needs to know about. From state-sponsored cyber espionage to the latest developments in ransomware, and a deep dive into the ’Commando Cat’ cryptojacking campaign targeting Docker APIs—this episode is packed with insights to keep you…
  continue reading
 
In this episode of ShadowTalk, host Kim, along with Corey and Gjergji, discusses the latest news in cyber security and threat research. Topics this week include: Data breach at NPD affecting millions resulted from exposed credentials Iran-linked APT groups abuse OpenAI to create US-election propaganda ReliaQuest Research: Service Account Abuse Reso…
  continue reading
 
In this episode, we sit down with Adrienne Galbrecht, Ontic’s Team Lead for Strategic Intelligence Services, to explore how her extensive background in law enforcement gives her a unique edge in the private sector. Adrienne shares insights from her decade-long experience as a crime and intelligence analyst, discussing the evolution of the intellige…
  continue reading
 
CYFIRMA’s research team have just published a new report on the QWERTY Info Stealer malware. Our analysis reveals how this malware collects and sends sensitive data from infected systems while using advanced techniques to avoid detection. Stay informed about this threat to better protect your data and systems. Link to the Research Report: QWERTY IN…
  continue reading
 
In today’s episode of *The Daily Threat*, we dive into the alarming rise in Distributed Denial of Service (DDoS) attacks, with a 46% surge in the first half of 2024. These aren’t just minor annoyances; they’re powerful attacks that could cripple your business. We’ll also cover the return of the notorious LockBit ransomware gang and a phishing scam …
  continue reading
 
FAMOUS CHOLLIMA, a new adversary CrowdStrike is tracking, has recently made headlines for its insider threat activity. In April 2024, CrowdStrike Services responded to the first of several incidents in which FAMOUS CHOLLIMA threat actors targeted 30+ US-based companies. The insiders claimed to be US residents and were hired for remote IT positions,…
  continue reading
 
Evgeniy, the author of a book on soft skills in technology sales, discusses the importance of soft skills in the tech industry. He emphasizes the need for curiosity, the ability to overcome fear, and the importance of practicing soft skills outside of work. Evgeniy also talks about the flaws in the way conferences are organized and suggests a more …
  continue reading
 
In part one of this podcast Harry Kemsley and Sean Corbett are joined by Janes analysts Dylan Lee Lehrke and James Rands to discuss the lessons learned from the ongoing conflict in Ukraine. The panel discusses the changing tactics deployed by Russia and Ukraine during the campaign and what this conflict has told us about the conduct of modern warfa…
  continue reading
 
U.S. water systems deliver safe and affordable drinking water to millions of people, while also supporting agriculture, industry, and power generation. However, this critical infrastructure faces significant challenges from aging facilities, increasing demand, and emerging cyberthreats. Our report outlines the key threats to water infrastructure, t…
  continue reading
 
**🚨 Cloud Breach Alert: Is Your Business at Risk? | Ransomware Surge Hits $450M 🚨 (Aug 20, 2024)** **Date:** August 20, 2024 In today’s episode of The Daily Threat, we’re breaking down the latest in cybersecurity news that every business leader needs to know. We’ll cover a massive phishing campaign orchestrated by Russia’s FSB, the staggering $450 …
  continue reading
 
In this episode of "The Daily Threat," we uncover the latest cybersecurity risks that could jeopardize your business. From vulnerabilities in Wi-Fi security to how cybercriminals are abusing trusted platforms like Microsoft Azure and Google to spread disinformation and malware, we cover the critical threats you need to be aware of. Don’t miss out o…
  continue reading
 
It’s 1979. Famous private Investigator, William Dear, begins his quest. Dallas Egbert, a genius young student, has gone missing from Michigan State University. Can Dear track him down, or is something more sinister at play? This episode contains graphic language. ~~~ All episodes will be available for free, but QCODE+ subscribers get early, uninter…
  continue reading
 
Thanks to the TIN FOIL MULISHA Become a member of the TIN FOIL MULISHA: https://www.ufonopodcast.net/tin-foil-mulisha Listen on all major platforms: https://ufono.buzzsprout.com Buy Merch: https://ufono-podcast.creator-spring.com Custom Merch from Lizzy's Creations: https://www.etsy.com/shop/LizzsCreationsStore Join our Discord: https://discord.gg/…
  continue reading
 
This week, Sam discusses recent developments including Project 2025 Phase 2, the efforts of Republi-Fascists to subvert elections and the Democratic National Convention's approach to combating fascism (is it weird or is it fascism?). She then welcomes Sian Norris back on the show to discuss the fascist riots in the UK that targeted asylum seekers a…
  continue reading
 
Enjoying the content? Let us know your feedback! In this week's episode we will dig in exploring a critical framework that’s reshaping how organizations approach cybersecurity—especially in the energy sector—known as the Cybersecurity Capability Maturity Model. This is also refer to C2M2. We’ll unpack what C2M2 is, why it’s so important, and how it…
  continue reading
 
In this week's update, we look at the U.S. rush to move additional firepower to the Middle East region before an anticipated Iranian attack on Israel. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this…
  continue reading
 
Ben and Guy discuss the latest developments in the mystery surrounding the attack on the Nord Stream pipeline and Iran's alleged effort to disrupt the U.S. presidential election. Then, Michael Rubin of the American Enterprise Institute joins the show to talk about the terrorist threats from Africa, whether Iran is closer than we think to acquiring …
  continue reading
 
Harry Kemsley and Sean Corbett are joined in this episode by Janes analysts Puja Banerjee, Sarbhanu Nath and Shivani Gayakwad to discuss the key events relating to the ongoing political instability in Bangladesh. Following weeks of protests and violence, the country is currently being run by an interim government following the resignation of Sheikh…
  continue reading
 
Top 5 Threat Hunting Headlines - 12 Aug 2024 1. DarkReading | SaaS Apps Present an Abbreviated Kill Chain for Attackers https://www.darkreading.com/application-security/saas-apps-present-abbreviated-kill-chain-for-attackers?&web_view=true 2. ReasonLabs | Enterprise Grade Security to All of Your Personal Devices https://reasonlabs.com/research/new-w…
  continue reading
 
Loading …

Quick Reference Guide