Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Welcome to The Cyber Security AI Agents Show — your daily dose of everything shaping the future of cyber defense, automation, and intelligent security operations. Every day, we break down how Security AI Agents are transforming Cyber Defense.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
Cyber Sentinel is your go-to podcast for expert insights into cybersecurity, digital privacy, and cutting-edge tech—featuring voices from pioneering companies like https://menavpn1.com/ . Hosted by Alex Carter of ByteShield, each episode features in-depth conversations with developers, ethical hackers, and privacy advocates working on the front lines of digital defense. Whether you’re a tech enthusiast, policy wonk, or developer, Cyber Sentinel brings you the knowledge and perspectives you n ...
…
continue reading
Bop
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
At Cyber Security Solutions, we specialize in providing a wide range of cybersecurity services designed to protect your digital assets and ensure the security of your online presence. We offer tailored solutions to meet the unique security needs of individuals and businesses alike.
…
continue reading
The cyber security podcast from SE LABS ® - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Iam Talking about the Information Security & Hacking in upcoming episodes. Im a Cyber Security Trainer https://instagram.com/chaudharypawansohlot
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Arisen Technologies is the Best IT Company, which provides all IT services like Cyber Security, Web Designing, Development, etc. It’s founded in 2006.
…
continue reading
We believe in empowering security leaders to maximize their strengths, equip them with the skills needed for the top security job and inspire them to become the leaders that their organizations and teams require and deserve. In this podcast Jeff Snyder, Executive coach and Cybersecurity Recruiter since 1997, and Yaron Levi, CISO and Security Advisor will share their experiences and the lessons learned in order to empower others to become the best version of themselves. This is our way to giv ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading

1
Hackers, Phreaks, and the Hunt for Par. The Genesis of Cybercrime
24:46
24:46
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:46Hackers, Phreaks, and the Hunt for Par. The Genesis of Cybercrime. The term "hacker" evokes a multitude of images, from the playful intellectual tinkerer to the shadowy cybercriminal. This report delves into the multifaceted history of hacking, tracing its evolution from nascent academic subcultures to a globally recognized phenomenon with profound…
…
continue reading

1
Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill
24:49
24:49
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:49Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest George Finney, CISO, The University of Texas System – check out George’s new book plus all his other achievements at his website, WellAwareSecurity. Thanks to our show sponsor, Conveyor Still spending hours maintaining a massive sprea…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
teissTalk: Navigating the rising legal threats to cyber-security leaders
44:12
44:12
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
44:12Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Michela Resta, Solicitor, CYXCEL https://www.linkedin.com/in/michelarestacyxce…
…
continue reading

1
20. Why you should do Security Awareness Training and how to get started (With Fredrik Nielsen - Partner and Product Owner at CyberPilot)
27:47
27:47
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
27:47Fredrik Nielsen who is partner in CyberPilot joins the podcast. He talks about why you should do Security Awareness Training. He comes across: Why Security Awareness training shouldn't just be for compliance Why culture and behavioral change should be the goal Why you should care about your employees when doing training 3 principles to implement in…
…
continue reading

1
How To Get Your Staff to Actually Care About Cybersecurity
39:45
39:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:45Welcome to Razorwire, the podcast that challenges conventional thinking about cybersecurity with insight, humour and a dose of reality. In this episode, James Rees is joined by security awareness specialists Amy Stokes-Waters and Jemma to dismantle outdated approaches to security training. From click-through fatigue to the critical importance of cu…
…
continue reading

1
Defensive Security Podcast Episode 306
52:40
52:40
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
52:40In this episode, Jerry and Andrew discuss the importance of data security, phishing attacks targeting hiring managers, the implications of paying ransoms, and the recent Disney data breach incident. They emphasize the need for better training for employees and the challenges of managing software supply chains. The conversation highlights the evolvi…
…
continue reading

1
RCR 161: AI and Financial Security: The New Frontier - Vendor Focus (NextPeak.net)
31:18
31:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
31:18The digital landscape for financial institutions has forever changed with the rapid advancement of artificial intelligence and machine learning technologies. What started as simple robotic process automation has evolved into sophisticated AI systems capable of transforming everything from fraud detection to customer service - but at what security c…
…
continue reading

1
How Security AI Agents will transform Cyber Security - Episode 2
12:58
12:58
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
12:58Security AI Agents will transform Security Operation Center (SOCs) Big moves from Microsoft: Agent2Agent (A2A) is here. And it’s about to change the AI game in cybersecurity — forever. Last week, Microsoft quietly dropped a power move: 🔗 Agent2Agent (A2A) — an open protocol for AI agents to communicate, collaborate, and coordinate actions autonomou…
…
continue reading

1
Episode 93: Episode 93 - Data Loss Protection - revisited
30:07
30:07
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
30:07Richard revisits the very important Cyber field of Data Loss Protection.
…
continue reading
The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading
Signal adds Recall blocker Critical Windows Server 2025 dMSA vulnerability warning Pathology lab suffers data breach Huge thanks to our sponsor, Conveyor Still spending hours maintaining a massive spreadsheet of Q&A pairs or using RFP tools to answer security questionnaires? Conveyor’s AI doesn’t need hand-holding and gets you accurate answers ever…
…
continue reading

1
South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape
19:20
19:20
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
19:20South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape Notable Cyber Actors and Incidents Across South AmericaI. Executive Summary * **Featured Hacker/Case: Alberto Daniel Hill (Cybersecurity Expert, Controversially Imprisoned)**The case of Alberto Daniel Hill in Uruguay presents a unique narrative, foc…
…
continue reading
From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
…
continue reading
Ransomware attack knocks out Kettering Health Lumma malware operation disrupted Federal agencies impacted by “major lapse” at Opexus Huge thanks to our sponsor, Conveyor Half-baked AI answers to security questionnaires are worse than no answer at all. Conveyor’s AI gets it right the first time—with market-leading accuracy rates and full citations f…
…
continue reading

1
SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter
26:10
26:10
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
26:10SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter "In the nascent, often chaotic, digital landscape of the late 1990s and early 2000s, few pieces of malicious software achieved the notoriety or inspired the same blend of fear and fascination as SubSeven. More than just a string of code, it became a legend—a potent Remot…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
20:51
20:51
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
20:51Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
…
continue reading

1
__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
16:12
16:12
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
16:12__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
…
continue reading

1
Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity
36:31
36:31
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
36:31Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity-
…
continue reading

1
DOJ investigates Coinbase attack, Dutch cyber-espionage law passes, VanHelsing ransomeware leaked
6:43
US DOJ opens investigation into Coinbase's recent cyberattack Dutch government passes law to criminalize cyber-espionage Ransomware attack on food distributor spells more pain for UK supermarkets Huge thanks to our sponsor, Conveyor What if your sales team could answer security questions themselves—without blowing up your Slack or email every 10 mi…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading
UK’s Legal Aid Agency breached NHS patients put at risk from cyberattacks 23andMe has a buyer Huge thanks to our sponsor, Conveyor Ever spent an hour in a clunky portal questionnaire with UI from 1999 just to lose your work because it timed out? Conveyor’s got you. Our browser extension completes questionnaires in the most tedious portals for you b…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading
Scattered Spider facilitates UK retail hacks and is moving to the U.S. Defendnot tool can disable Microsoft Defender FBI warns government officials about new waves of deepfakes Huge thanks to our sponsor, Conveyor Are you dealing with security questionnaire chaos this week? If so, get Conveyor’s AI to knock them out for you. Connect Conveyor to any…
…
continue reading

1
__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
20:12
20:12
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
20:12__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
29:05
29:05
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
29:05Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show. Here’s where you can find him: Daily Podcast on SoundCloud | YouTube | Forbes | Twitter/X | Facebook | BlueSky | Mastodon Thanks to our show sponsor, Vanta Do you know the status of your …
…
continue reading

1
Cartel Cell Networks_ Beyond Burner Phones & Encrypted Apps
13:12
13:12
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:12The assertion that Mexican drug cartels have engineered and deployed their own sophisticated, independent cellular networks to circumvent governmental surveillance, as detailed in the primary source article 1, presents a significant development in the operational capabilities of transnational criminal organizations. This report offers an exhaustive…
…
continue reading

1
Coinbase hackers bribe staff, Windows 11 hacked at Pwn2Own, Telegram purges black market group
8:08
Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom Windows 11 and Red Hat Linux hacked on first day of Pwn2Own The Internet’s biggest-ever black market just shut down amid a Telegram purge Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We …
…
continue reading

1
Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams
17:01
17:01
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
17:01Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams A significant challenge in this analysis is the current inaccessibility of the live Instagram profile @lanarose786. Consequently, this assessment relies on data from third-party analytics providers such as HypeAuditor , publicly accessible information from platforms including YouTub…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
Havana Syndrome Unpacked: From Sonic Attacks to Scientific Uncertainty
23:24
23:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:24Anomalous Health Incidents: An In-Depth Examination of the “Havana Syndrome” PhenomenonI. The Emergence of a Medical Mystery: Unexplained Health Incidents The perplexing saga of what became popularly known as “Havana Syndrome” began to unfold against a backdrop of shifting geopolitical tides. Its emergence not only presented a novel medical challen…
…
continue reading

1
Overview: Georgia Protests and Anonymous Activism
12:49
12:49
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
12:49This episode features a compelling conversation covering personal stories and insights into the world of cybersecurity and the challenges individuals face when navigating its complexities and interacting with legal systems. The discussion centers around the experiences of guests, including Alberto Daniel Hill, who shares his remarkable and difficul…
…
continue reading
Steel producer disrupted by cyberattack European Vulnerability Database (EUVD) is online CISA pauses advisory overhaul Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in…
…
continue reading
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading
Radware says recently WAF bypasses were patched in 2023 Marks & Spencer confirms data stolen in ransomware attack Alabama suffers cybersecurity event Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our G…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading
Global Crossing Airlines Group confirms cyberattack Google settles privacy lawsuits UK launches software security guidelines Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on po…
…
continue reading
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading