Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bad Romance, Kimsuky, Red Mike, Ivanti, Nvidia, C code, Postgre, Aaran Leyland... - SWN #451
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Tunnel of Love, Kimsuky, Red Mike, Ivanti, Nvidia, C code, Postgre, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-451
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Prompt Injection, CISA, Patch Tuesday - PSW #861
2:05:09
2:05:09
Play later
Play later
Lists
Like
Liked
2:05:09You can install Linux in your PDF, just upload everything to AI, hackers behind the forum, TP-Link's taking security seriously, patche Tuesday for everyone including Intel, AMD, Microsoft, Fortinet, and Ivanti, hacking your space heater for fun and fire, Cybertrucks on fire (or not), if you could just go ahead and get rid of the buffer overflows, s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Speak the Same Language, as Cybersecurity is Everyone's Responsibility - BSW #382
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07This week, we tackle a ton of leadership and communications articles: Why CISOs and Boards Must Speak the Same Language on Cybersecurity, The Hidden Costs of Not Having a Strong Cybersecurity Leader, Why Cybersecurity Is Everyone’s Responsibility, Leadership is an Action, not a Position, and more! Show Notes: https://securityweekly.com/bsw-382…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PlayStation, KerioControl, SEC SimSWAP, 8base, Copilot, AI, Bird, Josh Marpet... - SWN #450
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10PlayStation, KerioControl, SEC SimSWAP, 8base, Copilot, AI, Robert Bird, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-450
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unforgivable Vulns, DeepSeek iOS App Security Flaws, Memory Safety Standards - ASW #317
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52Identifying and eradicating unforgivable vulns, an unforgivable flaw (and a few others) in DeepSeek's iOS app, academics and industry looking to standardize principles and practices for memory safety, and more! Show Notes: https://securityweekly.com/asw-317
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Code Scanning That Works With Your Code - Scott Norberg - ASW #317
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breach details need to be transparent and kids need cybersecurity education - ESW #393
48:10
48:10
Play later
Play later
Lists
Like
Liked
48:10This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside look and lessons from a Recent APT Attack on a U.S. Aerospace Company - John Dwyer - ESW #393
31:32
31:32
Play later
Play later
Lists
Like
Liked
31:32Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting: It was a Chinese APT Maybe the B o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The groundbreaking technology addressing employment scams and deepfakes - Aaron Painter - ESW #393
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Cheese, CISA, Scaryware, Kimsuky Returns, Backups, Encryption, Jason Wood... - SWN #449
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02AI Cheese, CISA, Scaryware, Kimsuky Returns, Backups, Encryption, Jason Wood, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-449
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Deepseek, AMD, and Forgotten Buckets - PSW #860
2:06:54
2:06:54
Play later
Play later
Lists
Like
Liked
2:06:54Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Show Notes: https://securityweekly.com/psw-860
…
continue reading
![Artwork](/static/images/128pixel.png)
1
C-Suite Cybersecurity Responsibilities, Humble Leaders, and Effective Communication - BSW #381
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28In the leadership and communications segment, Cybersecurity Responsibilities Across the C-Suite: A Breakdown for Every Executive, Humble Leaders Inspire Others to Step Up, Effective Communication in the Workplace, and more! Show Notes: https://securityweekly.com/bsw-381
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Enforcement of the Digital Operational Resilience Act (DORA) - Madelein van der Hout - BSW #381
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DeepSeek, Nicolas Cage, OpenAI, Hackers, Ransomware, Canada, Joshua Marpet and More - SWN #448
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33Today, we've got: DeepSeek, Nicolas Cage, OpenAI, Hackers, Ransomware, Canada, Joshua Marpet and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-448
…
continue reading
![Artwork](/static/images/128pixel.png)
1
New SLAP & FLOP Attacks, OCSP Fades Away, DeepSeek's ClickHouse, OAuth 2.0 Security - ASW #316
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47Speculative data flow attacks demonstrated against Apple chips with SLAP and FLOP, the design and implementation choices that led to OCSP's demise, an appsec angle on AI, updating the threat model and recommendations for implementing OAuth 2.0, and more! Show Notes: https://securityweekly.com/asw-316…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Threat Modeling That Helps the Business - Sandy Carielli, Akira Brand - ASW #316
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54Threat modeling has been in the appsec toolbox for decades. But it hasn't always been used and it hasn't always been useful. Sandy Carielli shares what she's learned from talking to orgs about what's been successful, and what's failed, when they've approached this practice. Akira Brand joins to talk about her direct experience with building threat …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Semgrep non-drama, Facebook hates Linux - Vulns in Cars, Cell Towers, M365, and more - ESW #392
56:54
56:54
Play later
Play later
Lists
Like
Liked
56:54This week in the enterprise security weekly news, we discuss funding and acquisitions Understanding the Semgrep license drama Ridiculous vulnerabilities everywhere: vulns to take down your entire city’s cell service vulns to mess with your Subarus vulns in Microsoft 365 authentication cybersecurity regulations are worthless Facebook is banning peop…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Special Breaking AI News - there's too much AI news, can we please stop - ESW #392
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44This week, we've added an extra news segment just on AI. Not because we wanted to, but because the news cycle has bludgeoned us into it. My mom is asking about Chinese AI, my neighbor wants to know why his stocks tanked, my clients want to know how to prevent their employees from using DeepSeek, it's a mess. First, a DeepSeek primer, so we can make…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392
33:13
33:13
Play later
Play later
Lists
Like
Liked
33:13Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in the cybersecurity field, as well as the progress made in recent years. Women bring exceptional skills and knowledge to cybersecurity; however, it is estimated that they make up only 20% to 25% of the cy…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
.ASS, Deepseek, AI Time Travel, Google, HeartBlocker, TikTok, Aaran Leyland, and More - SWN #447
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58.ASS, Deepseek, AI Time Travel, Google, HeartBlocker, TikTok, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-447
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cred Vaults, Cheap AI, and Hacking Devices - PSW #859
2:05:52
2:05:52
Play later
Play later
Lists
Like
Liked
2:05:52This week, we talked to our friends at Bitwarden about password vaults, storing more than just passwords, free software to manage those SSH keys, and vaults for developers. In the news, new/old Palo Alto vulnerabilities explained, taking down the power grid with a FlipperZero, more vulnerable bootloaders, putting garbage in your .ASS file, the US G…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The CISO Role Elevates, Boosts, Rises, and Evolves - BSW #380
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44In the leadership and communications segment, How CISOs can elevate cybersecurity in boardroom discussions, Nearly half of CISOs now report to CEOs, showing their rising influence, Steve Jobs Shared 1 Crystal Clear Way You'll Spot an Exceptional Leader, and more! Show Notes: https://securityweekly.com/bsw-380…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI in 2025: The Shifting Regulatory Landscape For Artificial Intelligence - BSW #380
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DeepSeek, AIDs, Sex Crime, Microsoft, PayPal, GitHub, Joshua Marpet and More - SWN #446
29:43
29:43
Play later
Play later
Lists
Like
Liked
29:43DeepSeek, AIDs, Sex Crime, Microsoft, PayPal, GitHub, Joshua Marpet and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-446
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Opengrep & Semgrep, Hacking Subarus, Hacking Synths, Stealing Cookies, and RANsacked - ASW #315
34:57
34:57
Play later
Play later
Lists
Like
Liked
34:57An open source security project forks in response to license changes (and an echo of how we've been here before), car hacking via spectacularly insecure web apps, hacking a synth via spectacularly cool MIDI messages, cookie parsing problems, the RANsacked paper of 100+ LTE/5G vulns found from fuzzing, and more! Show Notes: https://securityweekly.co…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security the AI SDLC - Niv Braun - ASW #315
33:38
33:38
Play later
Play later
Lists
Like
Liked
33:38A lot of AI security boils down to the boring, but important, software security topics that appsec teams have been dealing with for decades. Niv Braun explains the distinctions between AI-related and AI-specific security as we avoid the FUD and hype of genAI to figure out where appsec teams can invest their time. He notes that data scientists have …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
IPOs are back, AI jumps the shark, NGFWs have some serious security issues - ESW #391
1:01:02
1:01:02
Play later
Play later
Lists
Like
Liked
1:01:02In this week's enterprise security news, the first cybersecurity IPO in 3.5 years! new companies new tools the fate of CISA and the cyber safety review board things we learned about AI in 2024 is the humanless SOC possible? NGFWs have some surprising vulnerabilities what did generative music sound like in 1996? All that and more, on this episode of…
…
continue reading