疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Join Tenzin Wangyal Rinpoche, other CyberSangha® hosts, and invited guests for illuminating teachings, guided meditations, and science/spirituality dialogs.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
We Cover the Cyberspace.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Stand-Up Comic and host of ESPN's Sportscenter on Snapchat, Cy Amundson, brings comedy and sports together in hilarious hour-long podcast episodes.
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with CyberRes, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email PodcastPartnerships@Studio71us.com We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Cyberpunk Cinema is the definitive dive into the dark future of science fiction. I will be breaking-down one film per week that best represents the thematic signatures of cyberpunk. So, do me a favor - it's time to access your cranial jacks, boot up your Ono Sendai Cyberspace 7, and slap on your damn mirrorshades! Join me as I take you through the matrix that is Cyberpunk Cinema!
…
continue reading
A high action, serial audio drama adventure following the wild lives of those living in the cyberpunk-deco city of Neo-Atlantis, 2112.
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email spollock@mcdonaldhopkins.com
…
continue reading
Cybersecurity Ally is Fortra’s cybersecurity podcast covering security, today’s cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Interviews with Scholars of Systems and Cybernetics about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/systems-and-cybernetics
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
In this episode of The Cy Amundson Show, it's been a frantic week of NFL action as the playoff field is officially down to four teams and head coaching jobs are being filled at a rapid pace... let's dig into all of it! SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cy…
…
continue reading
1
Unwanted Adult Product Celebrations
51:19
51:19
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
51:19
This week, Chad plays detective and Cy's toddler finds his sex toys. Head on over to Chad's YouTube page to watch this episode! AND go see Cy & Chad on the road! This episode is brought to you by BirdDogs! Get a completely free hat @birddogs with code SOMEWHERE at https://www.birddogs.com/SOMEWHERE! This episode is also brought to you by Hims! --- …
…
continue reading
1
Week in Review: Tik Tok’s return, Noem’s CISA plans, failed startup risks
28:58
28:58
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:58
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Shaun Marion, vp, CSO, Xcel Energy Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GR…
…
continue reading
1
Part-3 IoT Meetup 050125: Nachshon Pincu SVP @NIAtech cyber security on -“Phygital” the future of IoT
36:36
36:36
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
36:36
נחשון פינקו מדבר על "פיגיטל", העתיד של מיזוג פיזי עם דיגיטל. אילו גורמים מובילים תעשיות וספקים בכיוון זה היכן ומתי היא תפגוש מומחי סייבר ותפעול רמה טכנית - 100 (קלה) Nachshon Pincu talks about The future of blending physical with digital. What factors lead industries and vendors in this direction? Where and when will it meet cyber and operational e…
…
continue reading
1
Part-2 IoT Meetup 050125: Nimrod Luria Co-Founder & CTO@IO01 on Testing Security for Embedded Device
34:24
34:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
34:24
The second recording from the first IoT meetup occurred on January 5th, 2025. This section reviews an IP camera's security, attack, and protection from the protocol level to the firmware. Technical Level - 300Nachshon Pincu tarafından oluşturuldu
…
continue reading
1
Part-1: IoT Meetup 05/01/2025 Chen Gruber SW Dev Embedded Security @CheckPoint: Firmware Security
47:48
47:48
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
47:48
Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them. In this session…
…
continue reading
1
Episode 121: How We Evade Detection During Internal Pentests
40:44
40:44
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
40:44
In this episode, Spencer and Brad discuss the ever popular and highly debated topic of evasion. In this podcast we talk about evasion from the context of evading defense controls, not necessarily EDR specific evasion techniques. Our hope with this episode is to shed light on this topic and help defenders understand various methods of evasion and th…
…
continue reading
1
Episode 27 - What's in store for 2025
24:16
24:16
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:16
In the first episode of 2025, Danielle Phillips and Phil Jackman explore some to the exciting things that are happening in CyberNorth. Find out more at www.cybernorth.biz
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 94
22:27
22:27
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:27
Jason Garbin from Numberline Security joins Chris Steffen and Ken Buckler from EMA to discuss the Zero Trust Maturity Model.Enterprise Management Associates + DEVOPSdigest tarafından oluşturuldu
…
continue reading
1
Stolen Credentials From Leading Cyber Security Vendors Selling For $10: Cyber Security Today, Friday, Jan 24, 2025
7:05
Cybersecurity Today: Stolen Credentials, Firewall Leaks, and Energy Sector Risks In this episode of Cybersecurity Today, host Jim Love discusses the alarming sale of thousands of credentials from leading cybersecurity vendors on the dark web, a massive leak of FortiGate firewall configuration files impacting nearly 5,000 organizations, and a major …
…
continue reading
TSA cyber chief David Pekoske ousted by new administration CISOs gain boardroom traction Influence but still lack soft skills, says Splunk Cisco Fixes vulnerability in Meeting Management Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for…
…
continue reading
1
Biggest Data Breach in Modern History. What To Do Now.
49:01
49:01
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
49:01
The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story. The biggest data breach in modern history, involving National Public Data and its sister site Records Check. The breach …
…
continue reading
1
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo)
14:45
14:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
14:45
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
…
continue reading
1
Cyber Security for Charities - what trustees and managers need to know
13:19
13:19
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:19
This episode explains Cyber Essentials, a UK government-backed scheme that helps charities protect themselves against common cyber attacks. Trustees and leaders are responsible for ensuring their charity's IT systems and data are secure. This is essential for maintaining public trust, protecting beneficiaries, and securing funding. Cyber Essentials…
…
continue reading
1
Awareness And Training | Guide To NIST 800-171
12:34
12:34
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
12:34
Welcome to episode three of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdef…
…
continue reading
1
Federal Solutions for Israel and Palestine with Adar Weinreb
1:08:59
1:08:59
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:08:59
In this episode, we sit down with Adar Weinreb, founder of Sulha, to explore the roots of the Israeli-Palestinian conflict and discuss alternative governance models beyond the nation-state. From the failures of partition to federal and confederal solutions like the Federation Plan, we delve into how decentralized frameworks could address the challe…
…
continue reading
1
Hacking the Way Forward with Max Harley
1:07:53
1:07:53
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:07:53
Max Harley's journey into cybersecurity began unexpectedly with a childhood passion for video games, which sparked a deeper interest in programming and security. His competitive spirit emerged through capture-the-flag competitions, leading him to impactful roles at SpecterOps and Prelude, emphasizing mentorship, networking, and continuous learning …
…
continue reading
1
DHS terminates the Cyber Security Review Board, Major cybersecurity vendors' credentials found on Dark Web, Trump pardons creator of Silk Road
6:42
Trump administration fires members of cybersecurity review board in ‘horribly shortsighted’ decision Major Cybersecurity Vendors' Credentials Found on Dark Web PowerSchool hacker claims they stole data of 62 million students Thanks to today’s episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We k…
…
continue reading
1
Why Cyber Attacks are Not All Equal
33:01
33:01
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
33:01
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other …
…
continue reading
1
SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance
7:49
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
…
continue reading
1
Balancing Security and Usability in IT: Lessons from Matt Huff
34:39
34:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
34:39
In This Episode Matt Huff shares his remarkable journey from factory work to becoming the CIO of Tanner LLC, one of the premier accounting firms in Utah. Matt discusses how Tanner has embraced cybersecurity as a core offering, providing services such as SOC 2 compliance, ISO 27001 audits, and penetration testing. He explains how his pragmatic appro…
…
continue reading
1
WEF's Global Cybersecurity Outlook 2025 - Threats and Opportunities
15:16
15:16
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
15:16
In this episode, Reimagining Cyber's Rob Aragao dives into the World Economic Forum's recently released Cybersecurity Outlook for 2025. Key areas highlighted include the impact of geopolitical tensions on cyber espionage, the persistent threat of ransomware, the dual role of AI in bolstering cybersecurity and amplifying cyber attacks, and the ongoi…
…
continue reading
1
Embracing Attachment, Cultivating Generosity
44:02
44:02
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
44:02
Episode 7, Series 1: "Embracing Life with Wisdom & Compassion" Featuring: Tenzin Wangyal Rinpoche Join Tenzin Wangyal Rinpoche for a live online teaching as we begin Month 4 of his yearlong program, “Embracing Life with Wisdom & Compassion.” Free and open to all! Our focus this month is on meeting any sense of attachment we may experience in our bo…
…
continue reading
1
AI, Ransomware, and Medical Devices: Safeguarding Healthcare with Errol Weiss
33:45
33:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
33:45
Overview: In this episode of Cyber Focus, host Frank Cilluffo interviews Errol Weiss, Chief Security Officer at the Health Information Sharing and Analysis Center (Health ISAC). They discuss the evolving cybersecurity challenges in the healthcare sector, including ransomware, supply chain vulnerabilities, and the critical need for better security m…
…
continue reading
Critical Cybersecurity Updates: Avery Data Breach, Hamilton Ransomware Attack, and Microsoft Outlook Patch In this episode of Cybersecurity Today, host Jim Love covers significant cybersecurity incidents and updates. Avery experiences a massive data breach affecting 61,000 customers due to a credit card skimmer. The city of Hamilton commits $52 mil…
…
continue reading
7-Zip flaw bypasses Windows security warnings Attackers impersonate Ukraine’s CERT-UA AI Executive Order revoked Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time …
…
continue reading
1
Episode 440 - ZTW25 - Zero Trust World - Revolutionizing Incident Response
13:39
13:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:39
In the lead up to Zero Trust World 2025 we speak with Rob Allen, Chief Product Officer, ThreatLocker. ThreatLocker protects endpoints and data from zero-day malware, ransomware, and other malicious software, and provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. Visit https://…
…
continue reading
1
THEOS Cybernova - Nigel Phair: The View from Down Under
41:02
41:02
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
41:02
THEOS Cybernova Ep.4 - Nigel Phair: The View from Down Under What makes Australia's cybersecurity landscape unique? In this thought-provoking episode of THEOS Cybernova, host Paul Jackson sits down with Nigel Phair, a former law enforcement professional turned academic, industry advisor, and bestselling author of five books. Paul and Nigel explore …
…
continue reading
1
SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing
9:16
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
…
continue reading
1
From Critical Alerts to Business Context: Why CTEM is the Future of Cybersecurity
41:00
41:00
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
41:00
In this episode of Cyber Talks, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Roselle Safran, Founder & CEO at KeyCaliber, discuss the evolution of Continuous Threat Exposure Management (CTEM) and its role in modern cybersecurity. They explore the practical application of CTEM, its benefits for business context in securit…
…
continue reading
1
Resilient Cyber w/ Rajan Kapoor - Native Cloud Workspace Gaps and Risks
30:17
30:17
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
30:17
In this episode, we sit down with Rajan Kapoor, Field CISO of Material Security, to discuss the security risks and shortcomings of native cloud workspace security offerings and the role of modern platforms for email security, data governance, and posture management. Email and Cloud Collaboration Workspace Security continues to be one of the most pe…
…
continue reading
1
Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025
31:30
31:30
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
31:30
While cybercriminals can (and do) infiltrate organizations by exploiting software vulnerabilities and launching brute force attacks, the most direct—and often the most effective—route is via the inbox. As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attack…
…
continue reading
1
Cyber Defense Radio - Lalit Ahluwalia - DigitalXForce - Hotseat - Podcast - 2025
16:33
16:33
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
16:33
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Lalit Ahluwalia, CEO and Founder of DigitalXForce, https://digitalxforce.com/, who delivers the Digital Trust Platform integrating Security Privacy Posture Management and Risk Compliance. DigitalXForce enterprise security and risk posture management surpas…
…
continue reading
1
When the FBI Becomes Your IT Department
13:00
13:00
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:00
In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers. W…
…
continue reading
HPE investigates breach claims Former CIA analyst pleads guilty to sharing Top Secret files Data of nearly half million hotel guests exposed Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC progra…
…
continue reading
1
SANS ISC Stormcast, Jan 21, 2025: Downloading Partial ZIP files; Remote Tools Used in Attakcs; Azure DevOps SSRF
6:20
In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
…
continue reading
1
Defensive Security Podcast Episode 293
48:17
48:17
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
48:17
“Another day, another data breach.” In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense s…
…
continue reading
1
Sneaky 2FA Attacks Microsoft 365 Users Breaking Two Factor Authentication (2FA): Cyber Security Today Monday January 20, 2025
5:57
Cybersecurity Today: Sneaky 2FA Phishing Attack & AI-Powered Scams In this episode of Cybersecurity Today, host Jim Love explores the emergence of Sneaky 2FA, a new phishing-as-a-service attack that compromises two-factor authentication for Microsoft 365 users. The episode also covers a legal case where a scam led a Western Australian company to lo…
…
continue reading
Tik Tok is back, with strings attached Noem promises to curtail CISA Label company Avery announces data breach Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time ch…
…
continue reading
1
Episode 439 - Deepfake fraud threats to financial institutions
13:25
13:25
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
13:25
Group-IB has released a fascinating case investigation on deep fake fraud. Group-IB’s Fraud Protection team published a report on how threat actors use deepfake technology to bypass biometric security in financial institutions, including facial recognition and liveness detection. It also details how they recently assisted a major Indonesian financi…
…
continue reading
1
SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities
3:24
In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent gues…
…
continue reading
The US has signed into new law the Ban of Tik Tok which took effect today and now is on hold pending a sale in the next 90-days. What does this mean? Covering: latest news on tik tok ban, latest on tik tok ban, latest tik tok ban, latest tik tok ban news in us, TikTok ban in US latest news, TikTok ban in USA latest news, TikTok banned in us, TikTok…
…
continue reading
1
Cybercrime vs Small Business. Insider View of Cyber Crime.
49:18
49:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
49:18
Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
…
continue reading
1
059|冬季氛围检查:听播客暂停立刻去喝水 Winter Vibe Check: Everybody Hydrate Now
1:07:24
1:07:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:07:24
【聊了什么 The What】 重大发现:一月是星期一。大家多喝水。 Main takeaways: January is Monday. Stay hydrated. 【听众专属福利】 一起订阅《三联生活周刊》数字刊会员年卡吧! 🎉 疲惫娇娃专属渠道粉丝下单享受六折优惠🎉 【疲惫红书 CyberRed】 除了播客以外,疲惫娇娃的几个女的在小红书上开了官方账号,我们会不定期发布【疲惫在读】、【疲惫在看】、【疲惫旅行】、【疲惫Vlog】等等更加轻盈、好玩、实验性质的内容。如果你想知道除了播客以外我们在关注什么,快来小红书评论区和我们互动。 Apart from the podcast, we have set up an official account on Xiaohongshu. We …
…
continue reading
1
Social Media Fraud Targets Truth Social: Cyber Security Today Weekend with Netcraft's Robert Duncan - Jan 18, 2025
26:05
26:05
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
26:05
Addressing Social Media Fraud: Insights from Netcraft's Robert Duncan In this weekend edition of Cybersecurity Today, host Jim Love discusses the growing issue of fraud in the cybersecurity landscape. Jim interviews Robert Duncan, VP of Product Strategy at Netcraft, who sheds light on their research into fraudulent activities on social media platfo…
…
continue reading
1
Week in Review: IRS PIN available, AI ransomware group, UK ransomware ban
29:35
29:35
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
29:35
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Phil Beyer, head of security, Flex Thanks to our show sponsor, Dropzone.ai What if your SOC could handle 10x the alerts without burning out your team? Dropzone AI automates Tier 1 investigations and frees your analysts to tackle bigge…
…
continue reading