Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
We Cover the Cyberspace.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
We do reviews of movies, series, shows and animation shows and film from streaming entertainment giant Netflix. Tune in to find out what's what, like what to watch and what not to watch! SPOILER ALERT! Check out our other show; https://theenglishgame.transistor.fm/
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Discussing all things tech and simplifying concepts for those new to tech.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Compelling conversations with Tech Industry leaders.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
The podcast by the Linux Mint community for all users of Linux
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
…
continue reading
1
121. Mic Drop: A unusual peek inside a North Korean malware lab
10:43
10:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:43
North Korea has a unique way of testing malware — they are less concerned about getting it right than getting it out… a kind of “smash-and-grab” approach to cyber attacks. Sentinel One’s Tom Hegel explains.על ידי Recorded Future News
…
continue reading
1
434 – Open Source, Close Malware
1:38:39
1:38:39
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:38:39
First up in the news: Red Hat Announces Nova Graphics Driver for NVIDIA GPUs, Blender 4.1 released, MakuluLinux brings LinDoz back this time with AI, the end of EXT2 In security and privacy: Backdoor found in widely used Linux utility breaks encrypted SSH connections, Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices Then…
…
continue reading
1
PCI Monthly Update: Latest PCI News, Requirement 11 Overview, and QSA Insights
33:43
33:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:43
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
…
continue reading
1
126. The future of robotics from MIT’s "Computer Science and Artificial Intelligence Labs Alliances" podcast
28:17
28:17
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:17
An episode from the ‘CSAIL Alliances Podcast’ from MIT CSAIL Alliances. Host Kara Miller talks with MIT robotics researcher and professor Daniela Rus about how we can use a new generation of robots to help humankind. Rus is the co-author of the new book, "The Heart and the Chip: Our Bright Future with Robots."…
…
continue reading
1
CYFIRMA Research - Fletchen Stealer: An Information Stealer with Sophisticated Anti-Analysis Measures
3:22
3:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
3:22
Cyfirma research team discovered a new information stealer named Fletchen Stealer. It is a sophisticated information-stealing malware, offered by its creator as stealer-as-a-service for free that poses a significant threat to cybersecurity. A potent malware written in Rust which boasts advanced anti-analysis capabilities exhibits a high degree of r…
…
continue reading
1
Cyber Security Today, April 29, 2024 - Credential stuffing attacks are hitting firms using Okta ID management solutions, and more
7:10
7:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:10
This episode reports on a job scam aimed at app developers, the latest data breach notifications and moreעל ידי Howard Solomon
…
continue reading
1
Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?
24:48
24:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
24:48
In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access. Discussio…
…
continue reading
Episode 175: A host of new updates from Proton, unsettling research into dating app privacy, weaponization of deepfakes in a school, bad news about stock Android keyboards, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Source…
…
continue reading
1
E190 | DEAD BOY DETECTIVES (Series)
24:41
24:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
24:41
Two teenage ghosts collaborate with a clairvoyant to unravel mysteries for their supernatural clients, constantly eluding Death of the Endless and the Night Nurse. While dodging their own passage to the afterlife, they succeed in aiding every ghost they meet to cross over, until a formidable witch disrupts their endeavors.…
…
continue reading
1
Cerber ransomware strikes Linux.
15:34
15:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:34
Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. The research states "Cerber emerged and was at the peak of its activity…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 26, 2024
32:18
32:18
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:18
This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open-source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future of TikTokעל ידי Howard Solomon
…
continue reading
1
Checklist 373 - Change We Can’t Believe In
17:37
17:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:37
We are looking at the recent Change Healthcare hack that may have exposed info on half of the people in the U.S. HALF! Then - an iPhone scam that is notable for its simplicity and brazenness. Don’t try THAT at home. Try Checklist No. 373, brought to you by SecureMac! Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checkl…
…
continue reading
1
Cyber Security Today, April 26, 2024 - Patch warnings for Cisco ASA gateways and a WordPress plugin
6:42
6:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:42
This episode reports on the malicious plugin worm that refuses to die, and moreעל ידי Howard Solomon
…
continue reading
1
125. Mic Drop: The problem with the Nigerian economy has nothing to do with crypto
13:32
13:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:32
Before Nigerian authorities detained two mid-level Binance executives back in February, they were telling anyone who would listen that the cryptocurrency platform was manipulating the value of its currency, the naira. It turns out the more likely culprit is more than a decade of economic mismanagement. We explain.…
…
continue reading
1
Social media giants under fire – Biden v TikTok, Grant v X
21:43
21:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
21:43
In this episode of the Cyber Uncut podcast, Liam Garman and David Hollingworth unpack how the US and Australian governments are holding social media giants responsible for their content and data safety. The pair begin by discussing revelations that Congress is looking to force ByteDance to sell TikTok in the United States to an approved third party…
…
continue reading
1
Q&A: Can You Use Company Devices Privately?
14:35
14:35
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
14:35
Q&A174: How can you achieve privacy on company devices? How do we handle high-privilege risks like Intel ME and AMD PSP? What are our thoughts on the new Fairbuds? Are there any privacy-friendly speech synthesis software for Windows? Join our next Q&A on Patreon: https://www.patreon.com/posts/q-can-you-use-103001806 Welcome to the Surveillance Repo…
…
continue reading
1
IBM Bid to Acquire Hashicorp! Health Group Pays Ransom! Crazy Patch Story!
22:39
22:39
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
22:39
On this episode of the podcast, I cover the news of a bid by IBM to acquire Hashicorp who makes Terraform and Packer amongst other tools, I cover some updates about VMware EUC and Broadcom plus much more!Reference Links: https://www.rorymon.com/blog/ibm-bid-to-acquire-hashicorp-health-group-pays-ransom-crazy-patch-story/…
…
continue reading
In our Innards section: Migrating Pihole and wireguard to an x86_64 system In Vibrations from the Ether, we have listener feedback about malicious Linux developer vulnerabilities And finally, in Check This Out, Bill discusses Fullup – The comprehensive update script for Arch Linux based systems 00:00:00 – Intro 00:04:47 – Innards 00:32:26 – Vibrati…
…
continue reading
1
Cyber Security Today, April 24, 2024 - Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more
8:16
8:16
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
8:16
This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and password adviceעל ידי Howard Solomon
…
continue reading
1
CYFIRMA Research - APT Quarterly Highlights: Q1 – 2024
5:45
5:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:45
Our Q1 2024 APT Quarterly Highlights Report unveils a surge of dynamic and innovative cyber activities from APT groups from Iran, Russia, China, and North Korea, challenging the global cybersecurity landscape. Detailed analysis reveals escalating cyber threats, with Iranian groups like Homeland Justice and Mint Sandstorm targeting governmental and …
…
continue reading
1
SN 971: Chat (out of) Control - Fuxnet, Android Quarantine, Gentoo
2:15:59
2:15:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:15:59
What do you call "Stuxnet on steroids"?? Voyager 1 update Android 15 to quarantine apps Thunderbird & Microsoft Exchange China bans Western encrypted messaging apps Gentoo says "no" to AI Cars collecting diving data Freezing your credit Investopedia Computer Science Abstractions Lazy People vs. Secure Systems Actalis issues free S/MIME certificates…
…
continue reading
1
SN 971: Chat (out of) Control - Fuxnet, Android Quarantine, Gentoo
2:15:59
2:15:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:15:59
What do you call "Stuxnet on steroids"?? Voyager 1 update Android 15 to quarantine apps Thunderbird & Microsoft Exchange China bans Western encrypted messaging apps Gentoo says "no" to AI Cars collecting diving data Freezing your credit Investopedia Computer Science Abstractions Lazy People vs. Secure Systems Actalis issues free S/MIME certificates…
…
continue reading
1
124. The company man: US response to Nigeria’s detention of former IRS crypto investigator rankles federal agents
33:47
33:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:47
A former American IRS investigator responsible for some of the earliest dark market takedowns has been in Nigerian custody since February. Neither Nigerian nor the US authorities seem to be distinguishing Tigran Gambaryan from Binance, the company where he works.על ידי Recorded Future News
…
continue reading
1
CYFIRMA Research - The Shadow War between Israel and Iran Escalates
5:21
5:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:21
A shadow war between Israel and Iran is escalating, but despite unprecedented attacks, both sides are so far trying to keep the conflict below the level of an all-out-war. Israel has vowed to respond to Iran's unprecedented attack; however, the war cabinet seems to be divided over the issue of retaliation. Political considerations are increasingly …
…
continue reading
1
Cyber Security Today, April 22, 2024 - Vulnerability found in CrushFTP file transfer software, security updates for Cisco's controller management application, and more
6:10
6:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
6:10
This episode reports on a new campaign to steal credentials from LastPass users, a warning to admits of Ivanti Avalanche mobile device management software, and moreעל ידי Howard Solomon
…
continue reading
1
Navigating Security Awareness in the Tech Industry with Erin Gallagher
22:20
22:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
22:20
In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her unconventional path from a communication major to leading security awareness programs at IBM and a large insurance company, befor…
…
continue reading
1
Are Your Discord Messages For Public Sale?
47:45
47:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
47:45
Episode 174: A new bot is selling your Discord content, DuckDuckGo has announced a new suite of privacy-protecting services, Proton & Standard Notes have joined forces, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00…
…
continue reading
1
Picking fights and gaining rights, with Justin Brookman
46:13
46:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
46:13
Our Lock and Code host, David Ruiz, has a bit of an apology to make: “Sorry for all the depressing episodes.” When the Lock and Code podcast explored online harassment and abuse this year, our guest provided several guidelines and tips for individuals to lock down their accounts and remove their sensitive information from the internet, but larger p…
…
continue reading
1
168 - Preparing for and responding to ransomeware attack - Part 2
33:31
33:31
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:31
In this week's episode, we will continue with part 2 on "Preparing for and responding to ransomeware attack" As I said last week, ransomware is a threat that will be around us for the foreseeable future. Do listen to part 1 before you listen to this episode. With that out of the way, lets have a look a top trending piece of update for you. There is…
…
continue reading
1
E189 | REBEL MOON: PART 2 - THE SCARGIVER
27:50
27:50
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:50
The villagers harvested all the wheat in four days, yet they constructed tunnels and ditches in less than two. A little girl fires a gun larger than her entire body, but the gun has no recoil. Moreover, a warrior amputates her own hand to attach another. The flashbacks are merely sorrowful tales of how the Mother-world ruined their lives. The princ…
…
continue reading
1
The art of information gathering.
31:48
31:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:48
Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. The rese…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday April 19, 2024
41:57
41:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
41:57
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departmentsעל ידי Howard Solomon
…
continue reading
First up in the News: Mint Monthly News, Mint is testing new CDN setup for repositories, EndeavourOS ends ARM branch due to lack of help, Proton buys Standard Notes, Dynebolic portable Linux renewed after 10 year hiatus, APT 2.9 released, 3.0 announced In Security and Privacy: Over 92,000 DLink NAS devices exposed via backdoor, with no patch (out o…
…
continue reading