Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
We Cover the Cyberspace.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
We do reviews of movies, series, shows and animation shows and film from streaming entertainment giant Netflix. Tune in to find out what's what, like what to watch and what not to watch! SPOILER ALERT! Check out our other show; https://theenglishgame.transistor.fm/
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Discussing all things tech and simplifying concepts for those new to tech.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Compelling conversations with Tech Industry leaders.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
The podcast by the Linux Mint community for all users of Linux
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities. Produced by PI Media LTD !#002#
…
continue reading
1
121. Mic Drop: A unusual peek inside a North Korean malware lab
10:43
10:43
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
10:43
North Korea has a unique way of testing malware — they are less concerned about getting it right than getting it out… a kind of “smash-and-grab” approach to cyber attacks. Sentinel One’s Tom Hegel explains.Recorded Future News tarafından oluşturuldu
…
continue reading
1
434 – Open Source, Close Malware
1:38:39
1:38:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:38:39
First up in the news: Red Hat Announces Nova Graphics Driver for NVIDIA GPUs, Blender 4.1 released, MakuluLinux brings LinDoz back this time with AI, the end of EXT2 In security and privacy: Backdoor found in widely used Linux utility breaks encrypted SSH connections, Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices Then…
…
continue reading
1
436 – Upgrade At Your Peril
1:33:28
1:33:28
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:33:28
First up in the news: AlmaLinux restores some deprecated stuff, Nouveau dev joins the bigs, Linux runs cars, Microsoft sneaks MS-DOS 4.0 into their open source portfolio, Ubuntu 24.04 is out…. And you shouldn’t upgrade your system yet In security and privacy: nope, nada Then in our Wanderings: Joe preps for zombies, Bill migrates, Majid is starstru…
…
continue reading
1
SN 972: Passkeys: A Shattered Dream? - IoT Default Passwords, Passkeys
2:11:22
2:11:22
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
2:11:22
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-…
…
continue reading
1
SN 972: Passkeys: A Shattered Dream? - IoT Default Passwords, Passkeys
2:11:22
2:11:22
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
2:11:22
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-…
…
continue reading
1
PCI Monthly Update: Latest PCI News, Requirement 11 Overview, and QSA Insights
33:43
33:43
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
33:43
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
…
continue reading
1
126. The future of robotics from MIT’s "Computer Science and Artificial Intelligence Labs Alliances" podcast
28:17
28:17
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:17
An episode from the ‘CSAIL Alliances Podcast’ from MIT CSAIL Alliances. Host Kara Miller talks with MIT robotics researcher and professor Daniela Rus about how we can use a new generation of robots to help humankind. Rus is the co-author of the new book, "The Heart and the Chip: Our Bright Future with Robots."…
…
continue reading
1
CYFIRMA Research - Fletchen Stealer: An Information Stealer with Sophisticated Anti-Analysis Measures
3:22
Cyfirma research team discovered a new information stealer named Fletchen Stealer. It is a sophisticated information-stealing malware, offered by its creator as stealer-as-a-service for free that poses a significant threat to cybersecurity. A potent malware written in Rust which boasts advanced anti-analysis capabilities exhibits a high degree of r…
…
continue reading
1
Cyber Security Today, April 29, 2024 - Credential stuffing attacks are hitting firms using Okta ID management solutions, and more
7:10
This episode reports on a job scam aimed at app developers, the latest data breach notifications and moreHoward Solomon tarafından oluşturuldu
…
continue reading
1
Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?
24:48
24:48
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:48
In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access. Discussio…
…
continue reading
1
Proton Just Got Even Better!
38:39
38:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
38:39
Episode 175: A host of new updates from Proton, unsettling research into dating app privacy, weaponization of deepfakes in a school, bad news about stock Android keyboards, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Source…
…
continue reading
1
E190 | DEAD BOY DETECTIVES (Series)
24:41
24:41
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:41
Two teenage ghosts collaborate with a clairvoyant to unravel mysteries for their supernatural clients, constantly eluding Death of the Endless and the Night Nurse. While dodging their own passage to the afterlife, they succeed in aiding every ghost they meet to cross over, until a formidable witch disrupts their endeavors.…
…
continue reading
1
Cerber ransomware strikes Linux.
15:34
15:34
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
15:34
Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. The research states "Cerber emerged and was at the peak of its activity…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 26, 2024
32:18
32:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
32:18
This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open-source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future of TikTokHoward Solomon tarafından oluşturuldu
…
continue reading
1
Checklist 373 - Change We Can’t Believe In
17:37
17:37
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
17:37
We are looking at the recent Change Healthcare hack that may have exposed info on half of the people in the U.S. HALF! Then - an iPhone scam that is notable for its simplicity and brazenness. Don’t try THAT at home. Try Checklist No. 373, brought to you by SecureMac! Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checkl…
…
continue reading
1
Cyber Security Today, April 26, 2024 - Patch warnings for Cisco ASA gateways and a WordPress plugin
6:42
This episode reports on the malicious plugin worm that refuses to die, and moreHoward Solomon tarafından oluşturuldu
…
continue reading
1
125. Mic Drop: The problem with the Nigerian economy has nothing to do with crypto
13:32
13:32
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:32
Before Nigerian authorities detained two mid-level Binance executives back in February, they were telling anyone who would listen that the cryptocurrency platform was manipulating the value of its currency, the naira. It turns out the more likely culprit is more than a decade of economic mismanagement. We explain.…
…
continue reading
1
Social media giants under fire – Biden v TikTok, Grant v X
21:43
21:43
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:43
In this episode of the Cyber Uncut podcast, Liam Garman and David Hollingworth unpack how the US and Australian governments are holding social media giants responsible for their content and data safety. The pair begin by discussing revelations that Congress is looking to force ByteDance to sell TikTok in the United States to an approved third party…
…
continue reading
1
Q&A: Can You Use Company Devices Privately?
14:35
14:35
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
14:35
Q&A174: How can you achieve privacy on company devices? How do we handle high-privilege risks like Intel ME and AMD PSP? What are our thoughts on the new Fairbuds? Are there any privacy-friendly speech synthesis software for Windows? Join our next Q&A on Patreon: https://www.patreon.com/posts/q-can-you-use-103001806 Welcome to the Surveillance Repo…
…
continue reading
1
IBM Bid to Acquire Hashicorp! Health Group Pays Ransom! Crazy Patch Story!
22:39
22:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:39
On this episode of the podcast, I cover the news of a bid by IBM to acquire Hashicorp who makes Terraform and Packer amongst other tools, I cover some updates about VMware EUC and Broadcom plus much more!Reference Links: https://www.rorymon.com/blog/ibm-bid-to-acquire-hashicorp-health-group-pays-ransom-crazy-patch-story/…
…
continue reading
1
435.5 – Pies and Wires
1:00:11
1:00:11
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:00:11
In our Innards section: Migrating Pihole and wireguard to an x86_64 system In Vibrations from the Ether, we have listener feedback about malicious Linux developer vulnerabilities And finally, in Check This Out, Bill discusses Fullup – The comprehensive update script for Arch Linux based systems 00:00:00 – Intro 00:04:47 – Innards 00:32:26 – Vibrati…
…
continue reading
1
Cyber Security Today, April 24, 2024 - Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more
8:16
This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and password adviceHoward Solomon tarafından oluşturuldu
…
continue reading
Our Q1 2024 APT Quarterly Highlights Report unveils a surge of dynamic and innovative cyber activities from APT groups from Iran, Russia, China, and North Korea, challenging the global cybersecurity landscape. Detailed analysis reveals escalating cyber threats, with Iranian groups like Homeland Justice and Mint Sandstorm targeting governmental and …
…
continue reading
1
SN 971: Chat (out of) Control - Fuxnet, Android Quarantine, Gentoo
2:15:59
2:15:59
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
2:15:59
What do you call "Stuxnet on steroids"?? Voyager 1 update Android 15 to quarantine apps Thunderbird & Microsoft Exchange China bans Western encrypted messaging apps Gentoo says "no" to AI Cars collecting diving data Freezing your credit Investopedia Computer Science Abstractions Lazy People vs. Secure Systems Actalis issues free S/MIME certificates…
…
continue reading
1
SN 971: Chat (out of) Control - Fuxnet, Android Quarantine, Gentoo
2:15:59
2:15:59
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
2:15:59
What do you call "Stuxnet on steroids"?? Voyager 1 update Android 15 to quarantine apps Thunderbird & Microsoft Exchange China bans Western encrypted messaging apps Gentoo says "no" to AI Cars collecting diving data Freezing your credit Investopedia Computer Science Abstractions Lazy People vs. Secure Systems Actalis issues free S/MIME certificates…
…
continue reading
1
124. The company man: US response to Nigeria’s detention of former IRS crypto investigator rankles federal agents
33:47
33:47
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
33:47
A former American IRS investigator responsible for some of the earliest dark market takedowns has been in Nigerian custody since February. Neither Nigerian nor the US authorities seem to be distinguishing Tigran Gambaryan from Binance, the company where he works.Recorded Future News tarafından oluşturuldu
…
continue reading
A shadow war between Israel and Iran is escalating, but despite unprecedented attacks, both sides are so far trying to keep the conflict below the level of an all-out-war. Israel has vowed to respond to Iran's unprecedented attack; however, the war cabinet seems to be divided over the issue of retaliation. Political considerations are increasingly …
…
continue reading
1
Cyber Security Today, April 22, 2024 - Vulnerability found in CrushFTP file transfer software, security updates for Cisco's controller management application, and more
6:10
This episode reports on a new campaign to steal credentials from LastPass users, a warning to admits of Ivanti Avalanche mobile device management software, and moreHoward Solomon tarafından oluşturuldu
…
continue reading
1
Navigating Security Awareness in the Tech Industry with Erin Gallagher
22:20
22:20
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:20
In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her unconventional path from a communication major to leading security awareness programs at IBM and a large insurance company, befor…
…
continue reading