Daily update on current cyber security threats
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Unusually in-depth conversations about the world's most pressing problems and what you can do to solve them. Subscribe by searching for '80000 Hours' wherever you get podcasts. Produced by Keiran Harris. Hosted by Rob Wiblin and Luisa Rodriguez.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Practical Positivity is a weekly podcast hosted by Sophie Cliff (aka The Joyful Coach). Each week she shares tips on how you can squeeze more joy out of your everyday, attitude hacks that will help you feel more confident and secure, and a whole load of practical positivity. Like what you hear? Don’t forget to subscribe!
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
One minute of national security with Frank Gaffney
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Sharyl Attkisson is a nonpartisan investigative journalist, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. She is the New York Times bestselling author of "The Smear," "Stonewalled," "Slanted," and "Follow the Science." She is managing editor of the Sun. morning national TV news program “Full Measure with Sharyl Attkisson.” Find out why her podcasts and Tedx talks have received many millions of views. Do your own research. Make up your ow ...
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, history and all things naval.
…
continue reading
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @OffTheHook@hackers.town
…
continue reading
Join us as we discuss various topics ranging from Law to the Natural Sciences. High Frequency Radio is a Talk Show like none other!
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What Happened With the CrowdStrike Update and Azure Outage
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47
CrowdStrike said a problem with an update the company pushed to Falcon sensors on Windows hosts on July 18 caused a blue screen of death, an issue that coincided with a Microsoft Azure outage and widespread outages across airlines, banks, hospitals, and other services. Our story on this incident: https://duo.com/decipher/crowdstrike-windows-update-…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Analyzing the CrowdStrike Incident and Its Ripple Effects - SWN #399
42:17
42:17
Play later
Play later
Lists
Like
Liked
42:17
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
…
continue reading
Oracle Quarterly Critical Patch Update https://www.oracle.com/security-alerts/cpujul2024.html Exchange Online Implementing Inbound SMTP DANE with DNSSEC https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-public-preview-of-inbound-smtp-dane-with-dnssec-for/ba-p/4155257 VPN Port Shadowing Vulnerability https://petsymposium.org/popet…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rational Security: The “Million Dollar Babydog” Edition
1:11:01
1:11:01
Play later
Play later
Lists
Like
Liked
1:11:01
This week Alan, Quinta, and Scott were joined by Lawfare Executive Editor Natalie Orpett to talk through one of the most eventful weeks in national security news in recent history, including: “Too Close for Comfort.” Former President Trump narrowly avoided an assassination attempt this past weekend that ultimately left one rally-goer dead and two o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Australia’s AUKUS officials, part 1: Hugh Jeffrey, Deputy Secretary SP&I
1:03:32
1:03:32
Play later
Play later
Lists
Like
Liked
1:03:32
What is Australia’s concept of ‘National Defence’ and where does AUKUS fit into it? What misconceptions exist about AUKUS Pillar One? What progress has been made to realise the potential of AUKUS Pillar Two? In this episode, Hugh Jeffrey joins Rory Medcalf to discuss Australia’s current strategic landscape, the Defence Strategic Review, National De…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Belongs To You. Explaining Identity Security Posture Management (ISPM). Dor Fledel, Okta.
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43
Dor Fledel, Senior Director of Product Management at Okta and Co-founder of Spera Security, joins host Scott Schober in this episode. Together, they discuss identity secure posture management, including how ISPM solutions can help organizations, why it's so important for businesses, and more. A trusted partner to businesses around the world, Okta p…
…
continue reading
Security Dojo is a segment of the Security Today Podcast that holds interviews, reviews and conversations of security technologies. This week on Security Dojo, Baer walks through the elements of the lock bypass. What it is, how it is a threat and if we should be concerned. We highlight the most popular bypasses, and Baer even demonstrates two of th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 437 - CocoPods and proper funding for open source
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Josh and Kurt talk about a pretty big bug found in CocoPods ownership. We also touch on a paper that discusses the technical debt that open source should have. We discuss what the long term sustainability of open source. There aren't any good solutions for open source today, but talking about these problems is important, we have to start to underst…
…
continue reading
In this interview at SINCON 2024, Dr. Joshua James, a Regional Counter Cyber Crime Coordinator for the United Nations Office on Drugs and Crime (UNODC), shared his insights on the Regional Counter-cybercrime programme at UNODC. Dr. James argued that while law enforcement agencies are getting better at responding to cybercrime, the cyber criminals a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Liquidmatrix Security Digest Podcast - Episode 7C
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03
Episode 0x7C Yup, this is a habit now. It's all fun and games until somehow you find yourself actually planning and not doing that whole "maybe we will, maybe we won't" thing. It's happening. We're back and making a habit of this! Upcoming this week... Lots of News Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag (or Deep D…
…
continue reading
Links: https://www.darkreading.com/cybersecurity-operations/a-cisos-guide-to-avoiding-jail-after-a-breach https://www.csoonline.com/article/2512955/us-supreme-court-ruling-will-likely-cause-cyber-regulation-chaos.html/ https://sansec.io/research/polyfill-supply-chain-attack https://www.securityweek.com/over-380k-hosts-still-referencing-malicious-po…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
264 - 7/8 - Mary Writz, SVP Product Management at Red Canary
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15
Mary Writz, SVP of Product Management at Red Canary is our feature interview this week. News from Tattered Cover, Arrow Electronics, PhotoPacks.ai, Ping Identity, Lares, LogRhythm and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = …
…
continue reading
Overview This week we deep-dive into one of the best vulnerabilities we’ve seen in a longtime regreSSHion - an unauthenticated, remote, root code-execution vulnerabilityin OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,FontForge, OpenVPN and a whole lot more. This week in Ubuntu Security Updates 39 unique CVEs addressed [USN-684…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Archive: Viktor Orbán Switches Democracy Off
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16
From April 14, 2020: Nobody has been more aggressive about using the coronavirus crisis to seize power than Hungarian strong man Viktor Orbán. Orbán declared a state of emergency and has been ruling by decree. He has also instigated criminal penalties for spreading false information about the coronavirus, and his Fidesz party has effectively dissol…
…
continue reading
Canberra Travels and Data Breach Victim Notifications; The Have I Been Pwned Challenge Coin; The Massive mSpy Breach; Sponsored by 1Password https://www.troyhunt.com/weekly-update-409/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
![Artwork](/static/images/128pixel.png)
1
UL NO. 441: Substrate, OpenAIs AGI Levels, US Literacy Rates
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20
HackerCamp Approaches, Introducing Substrate, Kaspersky--, Exim/Gitlab Vulns, Personal/Business Branding, and more… ➡ Check out the Autonomous IT Podcast: https://community.automox.com/autonomous-it-podcasts-144 Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sea Control 538 - Sunken Warships and Diplomatic Timebombs with Dr. Natali Pearson
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10
Links 1. The Australasian Journal of Maritime Archaeology.By Dr. Natali Pearson, Jared Samuelson, Jim Jarvie
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Trump Trials and Tribulations Weekly Round-up (July 18, 2024)
1:28:23
1:28:23
Play later
Play later
Lists
Like
Liked
1:28:23
This episode of “Trump's Trials and Tribulations,” was recorded on July 18 in front of a live audience on YouTube and Zoom. Lawfare Editor-in-Chief Benjamin Wittes spoke to Lawfare Legal Correspondent and Legal Fellow Anna Bower and Lawfare Senior Editor Roger Parloff about Judge Cannon’s order dismissing the classified documents case against Trump…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jul. 20-21, 2024. Weekend Update. WCYB Digital Radio.
1:44
1:44
Play later
Play later
Lists
Like
Liked
1:44
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
https://youtu.be/NgggZ_3ZBGgIn this daily security byte with WatchGuard CSO, Corey Nachreiner, he explains the recent Global IT outage cause by a CrowdStrike update. We also follow-up on RockYou and the RockYou2024 data dump of 10 billion recordsBy Secplicity
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime & Cybersecurity In Japan. DMM Bitcoin Hacked. Cartan McLaughlin, CEO, Nihon Cyber Defence
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09
Cartan McLaughlin is the founder and CEO of Nihon Cyber Defence (NCD), a Japan-based cybersecurity company. He is also featured on our list of cybersecurity pundits. In this episode, McLaughlin joins host David Braue to discuss the cybercrime and cybersecurity landscape in Japan, as well as the recent DMM Bitcoin hack, during which 4,502.9 BTC ($30…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Jump-starting SOC Analyst Careers, Addressing Cybersecurity Industry Challenges, and Historic Rumors in Enterprise Security - ESW #368
2:06:23
2:06:23
Play later
Play later
Lists
Like
Liked
2:06:23
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Ransomware Victim Experience. Hacking's Harmful Toll. Sherrod DeGrippo, Top Cybersecurity Expert
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36
According to Rusi.org, more individuals and organizations globally are becoming victims of ransomware. However, little is known about their experiences. Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, joins host Steve Morgan in this episode to discuss the ransomware victim experience and hacking's harmful toll. • For more o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep5: CrowdStrike's faulty update shuts down global networks
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Three Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
7MS #633: How to Create a Security Knowledgebase with Docusaurus
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16
Hey friends, we’re doing a little departure from our normal topics and focusing on how to create a security knowledgebase (is that one word or two?) using Docusaurus! It’s cool, it’s free, it’s from Meta and you can get up and going in just a few commands – check out their getting started guide to get rockin’ in about 5 minutes. Important files inc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jul. 19, 2024. India's Big Crypto Exchange Suffers Breach. WCYB Digital Radio.
1:24
1:24
Play later
Play later
Lists
Like
Liked
1:24
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jul. 19, 2024. Ukraine Authorities Apprehend Cybercriminals. WCYB Digital Radio.
3:00
3:00
Play later
Play later
Lists
Like
Liked
3:00
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Human Risk Management. Main Takeaways From New Report. Lev Lesokhin, OutThink.
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27
Lev Lesokhin is the EVP of Technology & Analytics at OutThink, a Cybersecurity Human Risk Management Platform empowering CISOs by targeting the source of 90% of all data breaches:human behavior. In this episode, he joins host Charlie Osborne to discuss OutThink's annual CRHM Report, including how the data was assembled, some of the main takeaways, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trump Speaks Candidly about His Near Assassination - Is the FBI?
1:00
1:00
Play later
Play later
Lists
Like
Liked
1:00
Former President Donald Trump wrapped up the Republican convention last night by speaking at length and very movingly about his experience with the attempt to assassinate him. He rightly gave God full credit for the truly miraculous last-second adjustment of his head that spared his life. Lots of folks are assessing who deserves blame for the attac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Rebecca Crootof on AI, DARPA, and the ELSI Framework
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
Rebecca Crootof, Professor of Law at the University of Richmond School of Law and the inaugural ELSI Visiting Scholar at DARPA, joins Kevin Frazier, a Tarbell Fellow at Lawfare, to discuss the weaponization of emerging technologies and her role as the inaugural ELSI Visiting Scholar at DARPA. This conversation explores the possibility of an AI arms…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
149. Mic Drop: China seeks a Great Leap Forward in cyber
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09
Chinese hackers are stepping up their game, according to Nigel Inkster, the former director of operations for Britain’s MI6. In an encore episode of Mic Drop, he says Chinese hackers are taking on a new swagger in cyberspace and borrowing things from a familiar playbook: a Russian one.By Recorded Future News
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Magazine Update: What Is Google Dorking? Sophisticated Hacker Technique Explained.
3:13
3:13
Play later
Play later
Lists
Like
Liked
3:13
Google dorking is a sophisticated hacker technique that uses Google Search to uncover hidden information, according to Theresa Payton, former White House CIO and a globally recognized digital investigator and cybersecurity expert. In the latest episode of "Ask Me Anything" on the Cybercrime Magazine Podcast sponsored by Pipl AMA, Payton illustrates…
…
continue reading
00:00 - PreShow Banter™ — Absolute Madmen 02:28 - BHIS - Talkin’ Bout [infosec] News 2024-07-15 03:18 - Wi-Fi Forge 07:31 - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth 22:39 - Story # 2: AT&T says criminals stole phone records of ‘nearly all’ customers i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#193 – Sihao Huang on the risk that US–China AI competition leads to war
2:23:34
2:23:34
Play later
Play later
Lists
Like
Liked
2:23:34
"You don’t necessarily need world-leading compute to create highly risky AI systems. The biggest biological design tools right now, like AlphaFold’s, are orders of magnitude smaller in terms of compute requirements than the frontier large language models. And China has the compute to train these systems. And if you’re, for instance, building a cybe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
3D Printing For Hackers - David Johnson - PSW #835
3:01:58
3:01:58
Play later
Play later
Lists
Like
Liked
3:01:58
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unmasking Anonymous. Original Member Of Hacking Collective Speaks. Mike Jones, Reformed Hacker.
13:29
13:29
Play later
Play later
Lists
Like
Liked
13:29
Mike Jones is a reformed unethical hacker who was an original member of the Anonymous hacking collective under the name of “Sting3r." He later left the collective after getting in contact with the FBI and becoming an informant before ultimately starting to work as an ethical hacker and security researcher. In this episode, Jones joins host Charlie …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Snowflake Breach Hits Ticketmaster. Key Details. Edna Conway, Board Director & Executive Advisor.
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47
Edna Conway an advisor to the C-Suite, Government agencies, Think Tank and Capital Investment organizations. She is featured on our list of cybersecurity pundits. In this episode, Conway joins host Amanda Glassner to talk about the Snowflake data breach, including how it has affected Ticketmaster customers, whether those with accounts on the site s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jul. 18, 2024. Ransomware Hits Colorado School District. WCYB Digital Radio.
1:22
1:22
Play later
Play later
Lists
Like
Liked
1:22
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
This Week In Tech. NGL App Banned For Minors, Samsung Launches Foldable Phones. WCYB Digital Radio.
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49
The Cybercrime Magazine Podcast brings you our weekly alert, which provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with the latest breaking news stories we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Airs weekly on WCYB Digital Radi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jul. 18, 2024. Hacker Dumps Personal Info of Trello Users. WCYB Digital Radio.
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ask Me Anything, Theresa Payton. Unraveling The Impossible With OSINT. Sponsored By Pipl.
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sea Control 537 - Europe's Role in Indo-Pacific Security with Dr. Joanna Siekiera
28:43
28:43
Play later
Play later
Lists
Like
Liked
28:43
Links 1. “Dragons in the West: Chinese Communist Party Threats in Europe and the Imperative of a Strategic Pivot,” by Joanna Siekiera, Irregular Warfare Initiative, February 27, 2024. 2. 21st Century as the Pacific Century: Culture and Security of Oceania States in Great Power Competition, edited by Joanna Siekiera, Wydawnictwa Uiwersytetu Warszaws…
…
continue reading
Israeli Prime Minister Benjamin Netanyahu will address Congress next week. The Biden administration continues pressing him to agree to a permanent ceasefire with Hamas, effectively translating into its victory over Israel. Fortunately, “Bibi” increasingly has another option: Hamas’ complete defeat. Despite Team Biden’s incessant interference – aime…
…
continue reading
Episode 356 of the Transatlantic Cable Podcast kicks off with news around the AT&T ‘mega-breach’. From there the team discuss two stories related to AI – the first looks at how AI is being used to help doctors detect early-onset Alzheimer’s; the team then talk about how K-Pop are looking to use artificial intelligence to write songs and create artw…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Michael Beckley and Arne Westad on the U.S.-China Relationship
55:54
55:54
Play later
Play later
Lists
Like
Liked
55:54
On today’s episode, Matt Gluck, Research Fellow at Lawfare, spoke with Michael Beckley, Associate Professor of Political Science at Tufts, and Arne Westad, the Elihu Professor of History at Yale. They discussed Beckley’s and Westad’s articles in Foreign Affairs on the best path forward for the U.S.-China strategic relationship—in the economic and m…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The startup leading AI security in the UK.
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44
This week, we are joined by Dr. Peter Garraghan, CEO of Mindgard, as he is discussing UK's recently published AI security guidelines and the recommendations he made for addressing cyber security risks in AI. Dave is examining the troubling challenges of regulating deepfake porn. Ben looks at a brand new Appeals Court decision on geofencing. While t…
…
continue reading
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as AVNeutralizer for many years. SentinelOne researchers Antonio Cocomazzi helps us dig into the group's tactics and tools. Read Antonio's new research here: https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enh…
…
continue reading