Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partners-in-crime, Dave Bittner and Rick Howard, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech profess ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
The American Idea explores America's Founding principles and their effect on American history and government. Through thoughtful conversations with renowned academics and public figures from across the country, we examine the history and political thought behind our country’s greatest documents and debates, as well as contemporary issues, American popular culture, and political statesmanship. The podcast is a production of the Ashbrook Center and hosted by Jeff Sikkenga.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Compelling conversations with Tech Industry leaders.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
We do reviews of movies, series, shows and animation shows and film from streaming entertainment giant Netflix. Tune in to find out what's what, like what to watch and what not to watch! SPOILER ALERT!
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
John Frangella covers topics of Business, Manufacturing and Innovation
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
1
T-Mobile confirms breach, AnnieMac data stolen, NewGlove malware threat
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
T-Mobile confirms telecom breach hack Customer data stolen from AnnieMac New Glove infostealer malware bypasses Chrome’s cookie encryption Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a pr…
…
continue reading
1
CYFIRMA Research: SpyNote: Unmasking a Sophisticated Android Malware
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42
A recently discovered variant of the SpyNote Remote Access Trojan (RAT) is posing as "Avast Mobile Security for Android." Upon installation, it gains extensive control over your device, silently granting itself permissions and displaying fake system update notifications. This sneaky malware operates in the background, restarts if stopped, and preve…
…
continue reading
1
Defensive Security Podcast Episode 285
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00
In this episode of the Defensive Security Podcast, we discuss the theft of cloud credentials, the exploitation of SharePoint vulnerabilities, evolving malware techniques, and the importance of cyber due diligence for suppliers. They reflect on the challenges of managing secrets, the implications of auto-updates, and the need for robust risk managem…
…
continue reading
1
197 - Advanced Malware evasion Techniques And Their Counter Measures
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34
Enjoying the content? Let us know your feedback! It is another week and another podcast shaw on YusufOnSecurity where we deep dive into the complex world of cybersecurity that concerns both professionals and anyone interested in how attackers continue to evolve their methods. This week we will be covering advanced malware evasion techniques—strateg…
…
continue reading
1
Whispers in the wires: A closer look at the new age of intrusion.
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware M…
…
continue reading
1
Massive Malware Campaign Targets WordPress Sites with Fake Plugins and Software Updates
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55
A large-scale malware campaign has compromised thousands of WordPress sites by using deceptive plugins to deliver malicious scripts disguised as software updates and error messages. The attackers, identified as ClearFake and ClickFix, have targeted over 6,000 websites, exploiting stolen login credentials to install fake plugins. These plugins injec…
…
continue reading
1
Scattered Spider arrest, telcos attacked, Apple exploit
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04
US charges Scattered Spider members Chinese threat actors infiltrate more telcos Apple issues emergency security update Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-de…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Micha…
…
continue reading
1
CONTESTED GROUND: Where does the misinformation bill leave free speech?
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23
In this episode of the Contested Ground podcast, shadow minister for communications and federal member for Banks David Coleman joins host Liam Garman to discuss the recent misinformation bill that will leave free speech and political discourse in Australia. They begin the podcast with a recap of what’s in the bill, including how the government will…
…
continue reading
How bad is our military recruiting crisis? Why are our armed services having sustained problems bringing in and retaining members? And what does this say about our strategic readiness, and what that means for our national security? Jeff is joined by Will Thibeau, former Army Ranger and defense policy authority to discuss this troubling, important i…
…
continue reading
1
Easterly to step down, Maxar discloses breach, Microsoft hacking event
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
CISA director Jen Easterly to step down Space tech giant Maxar discloses employee data breach Microsoft launches Zero Day Quest hacking event Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a…
…
continue reading
1
Microsoft Unveils New Cybersecurity Features at Ignite Conference: Cyber Security Today for November 20, 2024
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01
Cybersecurity Today: Microsoft Updates, Gen AI Risks, and Liminal Panda Threat In this episode of Cybersecurity Today, host Jim Love discusses major cybersecurity updates from Microsoft's Ignite conference, including enhancements to Windows security and device recovery. A survey by LegitSecurity highlights the security risks associated with generat…
…
continue reading
1
SN 1001: Artificial General Intelligence (AGI) - Gmail Temp Addresses, Russia's Internet Off Switch
2:25:09
2:25:09
Play later
Play later
Lists
Like
Liked
2:25:09
How Microsoft lured the US Government into a far deeper and expensive dependency upon its cybersecurity solutions. Gmail to offer native throwaway email aliases like Apple and Mozilla. Russia to ban several additional hosting companies and give its big Internet disconnect switch another test. Russia uses a diabolical Windows flaw to attack Ukrainia…
…
continue reading
1
SN 1001: Artificial General Intelligence (AGI) - Gmail Temp Addresses, Russia's Internet Off Switch
2:25:09
2:25:09
Play later
Play later
Lists
Like
Liked
2:25:09
How Microsoft lured the US Government into a far deeper and expensive dependency upon its cybersecurity solutions. Gmail to offer native throwaway email aliases like Apple and Mozilla. Russia to ban several additional hosting companies and give its big Internet disconnect switch another test. Russia uses a diabolical Windows flaw to attack Ukrainia…
…
continue reading
1
personally identifiable information (PII) (noun) [Word Notes]
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.By N2K Networks
…
continue reading
1
EPA warns of critical risks, Four million WordPress sites exposed, Sextortion scams bypass filters
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21
EPA warns of critical risks in drinking water infrastructure Four million WordPress sites exposed Sextortion scams bypass Microsoft security filters Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you…
…
continue reading
Holiday shopping season is here! And today I’ll give you the highlights of my annual Best & Worst Gift Guide for 2024, with regard to privacy and security. The worst offenders may not surprise you, though some have actually gotten worse since just last year. And I have a few new suggestions for people on your nice list! In the news this week: anoth…
…
continue reading
1
397: AI will Hug Your Face plus Android Fake Call Hacks
1:10:51
1:10:51
Play later
Play later
Lists
Like
Liked
1:10:51
video: https://youtu.be/JmKuqF6O5CE On this weeks episode we're going to discuss open source robotics and what the future holds in store for us. Welcome to Destination Linux, where we discuss the latest news, hot topics, gaming, mobile, and all things Open Source & Linux. Now let's get this show on the road toward Destination Linux! Download as MP3…
…
continue reading
1
#68 - The Misconceptions of AI - What Everybody Needs to Know
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13
Everyone, in every job, will be impacted by AI, but maybe not in the way you think. Listen to this insightful interview with AI expert Nada Sanders, Ph.D., Professor at Northeastern University and prolific author.By Extra Something Media
…
continue reading
1
Unknown Attacker Tries To Frame Security Researcher: Cyber Security Today for Monday, November 18th, 2024
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10
Cybersecurity Today: GitHub Attacks & Microsoft's November Patch Tuesday Updates In this episode of Cybersecurity Today, host Jim Love highlights critical cybersecurity updates. The episode covers malicious attacks on GitHub projects, including an orchestrated attempt to frame Texas-based security researcher Mike Bell, and the associated impact on …
…
continue reading
1
An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59
The month, a consumer rights group out of the UK posed a question to the public that they’d likely never considered: Were their air fryers spying on them? By analyzing the associated Android apps for three separate air fryer models from three different companies, a group of researchers learned that these kitchen devices didn’t just promise to make …
…
continue reading
Enjoying the content? Let us know your feedback! Today, we’ll dive into what browser engines are, how they power your online experiences, and the security efforts shaping the modern web. We’ll also unpack extension security, with a spotlight on Google’s Manifest v3, and see how Safari and Firefox approach these challenges. Whether you’re a casual b…
…
continue reading
1
AI in Action: Project Synapse With Marcel Gagne and John Pinard. Cyber Security Today Weekend Edition for November 16, 2024
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43
Cybersecurity Today - Weekend Edition: Project Synapse, AI in Action (Episode 2) In this episode of Cybersecurity Today with host Jim Love, we dive into the intersection of Artificial Intelligence (AI) and cybersecurity, continuing our exploration in the series Project Synapse. Joined by Linux and open-source expert Marcel Gagné and cybersecurity p…
…
continue reading
This week we are joined by, Blake Darché, Head of Cloudforce One at Cloudflare, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government…
…
continue reading
1
Week in Review: Most common passwords, Secure-by-design, DNA firm vanishes
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker …
…
continue reading
1
Checklist 400 - Reboots, PDFs, and Passwords
18:06
18:06
Play later
Play later
Lists
Like
Liked
18:06
This week, we’re diving into iOS 18’s “inactivity reboot.” Also - a North Korean phishing attack aimed at Macs that is so easy to thwart, plus NordPass is out with its list of the most common passwords of 2024 - and they’re even worse than you might imagine. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Secur…
…
continue reading
1
NordPass popular passwords, Healthcare extortion sentence, China breached telecoms
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18
China threat actors breached U.S. broadband providers to spy on U.S. government officials 123456 tops the list of most popular passwords again Hacker gets 10 years in prison for U.S. healthcare extortion scheme Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can …
…
continue reading
1
New Report Details Cyber Security Scams For Retailers At Christmas: Cyber Security Today for Friday, November 15, 2024
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50
Holiday Cyber Threats, Secret Service Surveillance & AI Safety with DOE In today's episode of Cybersecurity Today, host Jim Love covers essential cybersecurity topics heating up this holiday season. A new report from B4AI unveils sophisticated scams targeting online shoppers, including brand spoofing, fake apps, and fraudulent sites designed to ste…
…
continue reading
1
CYFIRMA Research- Black Basta Ransomware Group
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16
Stay vigilant against Black Basta’s sophisticated ransomware tactics! In our latest analysis, Black Basta continues to be a leading threat in the cyber landscape, targeting industries, such as healthcare, finance, and manufacturing. Known for exploiting vulnerabilities and using double extortion, this ransomware group applies social engineering to …
…
continue reading
1
Ransomware – a means to an end? With Sophos’ Aaron Bugal
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18
In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Aaron Bugal, field chief technology officer at Sophos, to unpack how businesses can keep themselves safe in the face of an ever-evolving threat environment. The pair begin the podcast by examining recent research from the company’s X-Ops division and how professionals should …
…
continue reading
1
Volt Typhoon's new botnet, China APT hits Tibet, DoD leaker sentenced
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31
Volt Typhoon rebuilding botnet Chinese group targets Tibetan media DoD leaker sentenced Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, the team shares follow up about FEMA …
…
continue reading
1
CYFIRMA Research- TRACKING RANSOMWARE : OCTOBER 2024
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27
Stay ahead of cybersecurity trends with CYFIRMA's October 2024 Ransomware Report! This month saw a 42.78% increase in ransomware, led by groups like RansomHub, and new threats emerging, such as Hellcat and Playboy. Manufacturing and Healthcare were heavily impacted, while DragonForce expanded its Ransomware-as-a-Service model. Tactics like “Bring Y…
…
continue reading
1
Elections of 2024 - Analysis, Commentary, and Reflections
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52
Jeff is joined by presidential historian Dr. Vincent Cannato, of the University of Massachusetts-Boston to discuss the elections of 2024, with particular focus on the presidential election. What happened? Why? How? What might it all mean? #trump2024 #harris2024 #elections2024results #elections2024 Read Vincent's most recent book: https://a.co/d/dr1…
…
continue reading
1
Giant Food cyberattack, Snowflake suspects indicted, zero-day vulnerability surge
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
Dutch cybersecurity incident affects Giant Food and Hannaford Indictment against Snowflake breach suspects is released Surge in zero-day vulnerability exploits is new normal, says Five Eyes Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security …
…
continue reading
1
Cisco Hits A Perfect 10 With A Critical Flaw in Industrial Wireless Systems: Cyber Security Today for Wednesday, November 13, 2024
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00
In this episode, we discuss urgent cybersecurity concerns: Cisco's critical vulnerability affecting industrial wireless systems with a CVSS 10 rating, D-Link's refusal to patch severe flaws in over 60,000 outdated NAS devices, and Amazon's data breach tied to the MoveIT vulnerability. We'll also cover the importance of strong off-boarding processes…
…
continue reading