Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
The Hurricane Labs InfoSec Podcast features the clashing of swords and witty banter about the latest security topics. Listen in as we discuss headlines, hacks, tech tips, Splunk stuff, and more!
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Thinking about the intersection of security, technology, and society—and what might be coming next. A curated 15-30 minute summary of the week's most important stories and ideas every Monday, and periodic essays and guest appearances that explore a single topic.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
Lighthearted security advice and banter from 1Password and guests.
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Cybersecurity Architecture podcast is a nonprofit podcast that aims to help security professionals to rethink their approach to infosec design and simplify their decision making process while they face the overcrowded innovative cybersecurity market.
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
Podcast by InfoSec Campus
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
Tune in to listen to Kyle Burk talk about Information Security, IT, and Development topics every week. Go to Twitch.Tv/SecuritySundays to join the conversation. Interested on being in the show? Email us here: mail@securitysundays.com
Your weekly dose of information security and open source intelligence news, tips and commentary.
Join us every week for live discussions on hacking, phreaking, and everything that DOESNT SUCK in infosec!
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Welcome to the Cybrary Podcast! In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Come join us on Cybrary and get to your Next Level! Want authorized access to the top security tips from the experts in InfoSec? Bi-weekly, join Thycotic’s ethical hacker Joseph Carson and the cybersecurity training experts from ...
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
CyberSpeaksLIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeaks ...
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Braxton Ehle and Sean Williams rant about the latest in information security news to help enterprises and mere mortals defend their information.
The Latest from the Internet of Things, Tech and InfoSec!
A podcast focused on current events in the information security space from Digital Guardian.
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
T
The InfoSec & OSINT Show


1
40 - Fabio Viggiani & Supply Chain Attacks
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03
This week Fabio Viggiani hangs out to talk about supply chain attacks, ransomware, mapping your software dependencies and assuming breach. My 3 main takeaways were 1) his insights into reverse engineering the SolarWinds Orion malware 2) Up-in-coming trends he sees in ransomware and 3) how he runs incident response investigations For more informatio…
H
Hurricane Labs InfoSec Podcast


1
FireEye & SolarWinds Follow-Up with Senior SOC Analyst Tony Robinson
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson back for a follow-up discussion about the FireEye and SolarWinds breaches. Related resources: FireEye and SolarWinds Breaches Q&A with Senior SOC Analyst Tony Robinson by Heather Terry Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory …
G
Getting Into Infosec


1
Dr. Eric Cole - Accidental CIA Hacker To Fortune 500 Security Advisory To Entrepreneur
49:18
49:18
Play later
Play later
Lists
Like
Liked
49:18
Dr. Eric Cole's career has been a mixed of sixth-sense chance encounters and wisdom / foresight of the future. His uncanny ability while younger to see the opportunity in cybersecurity combined with the wisdom to listen to those smarter than him is why he is where he is today. He is an accomplished cybersecurity hacker and executive advisor. His in…
For our latest episode of Humans of InfoSec: Emerging Voices, we’re excited to welcome Karan Dwivedi to the show. Karan is a security engineer at Google specializing in detection and response, but he dedicates his free time to coaching and mentoring others breaking into the field. His work demystifying the interview process for security engineers, …
All links and images for this episode can be found on CISO Series (https://cisoseries.com/click-this-link-to-fail-a-phishing-test/) Our phishing tests are designed to make you feel bad about yourself for clicking a link. We're starting to realize these tests are revealing how insensitive we are towards our employees. This episode is hosted by me, D…
C
Cyber Work


1
Cybersecurity careers: Risk management, privacy and healthcare security
51:14
51:14
Play later
Play later
Lists
Like
Liked
51:14
Learn about different cybersecurity roles and career paths in this wide-ranging conversation with today’s guest Tyler Cohen Wood. Tyler discusses working as a senior intelligence officer for the Defense Intelligence Agency (DIA), overseeing cyber risk for AT&T and writing her book Catching the Catfishers. We talk about online privacy, implementing …
Parler resurfaces online Darknet forum Joker's Stash shutting down Microsoft Defender to enable auto-remediation by default Thanks to our episode sponsor Armis All cybersecurity programs start with gaining full visibility into all the assets in the environment. Yet security teams continue to struggle to see every thing they have. This asset blind s…
In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there. To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of stories and insights. Marcus has written several books on security. They…
S
Security In Five Podcast


1
Episode 904 - Opening Up Security In Five Website To Guest Posting
4:24
4:24
Play later
Play later
Lists
Like
Liked
4:24
This podcast has a supporting blog at SecurityInFive.com. The blog is where you can find every single podcast episode as well as the content I have written over the years. This episode details how between now and June 30, 2021 I am opening the blog to guests posts at no cost to you. Be aware, be safe. Primary Partner - WeHackPurple.com Become A Pat…
Xiaomi added to Pentagon blacklist Dating apps are using images from the siege to ban rioters’ accounts NSA suggests enterprises use designated DNS-over-HTTPS resolvers Thanks to our episode sponsor Armis Lack of complete visibility to all assets in any environment is a huge cybersecurity challenge for every organization. And fragmentation across t…
T
The CyberWire Daily


1
Encore: You will pay for that one way or another. [Caveat]
36:09
36:09
Play later
Play later
Lists
Like
Liked
36:09
Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails. W…
G
Grassroots Security: Cybersecurity for Everyone


1
New Year, Your Memory and Misinformation | Grassroots Security (S2:E1)
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50
Happy New Year! In this episode, we talk about misinformation and disinformation and how your memory may contribute to both misattribution and bias. We also talk about how to deal better with misinformation. Blog Post (including references): https://grassrootsecurity.com/2021/01/18/new-year-your-memory-and-misinformation/…
It is our first guest of season 4 and we had the honor of chatting with Tanya Janca or @shehackspurple on Twitter. We discuss application security, training, mentoring, and a few other fun things. We hope you enjoy this episode as much as we had fun with the conversation. Find out guest here: https://twitter.com/shehackspurple https://wehackpurple.…
T
The CyberWire Daily


1
Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47
Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersec…
T
The CyberWire Daily


1
Manufacturing sector is increasingly a target for adversaries. [Research Saturday]
25:47
25:47
Play later
Play later
Lists
Like
Liked
25:47
Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and proc…
T
The CyberWire Daily


1
Charming Kitten’s smishing and phishing. Solorigate updates. Supply chain attacks and the convergence of espionage and crime. Greed-bait. Ring patches bug. Best practices from NSA, CISA.
26:01
26:01
Play later
Play later
Lists
Like
Liked
26:01
Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best p…
7
7 Minute Security


1
7MS #450: DIY Pentest Dropbox Tips - part 4
56:22
56:22
Play later
Play later
Lists
Like
Liked
56:22
Hey friends! We're continuing our series on pentest dropbox building - specifically playing off last week's episode where we started talking about automating the OS builds that go on our dropboxes. Today we'll zoom in a little closer and talk about some of the specific scripting we do to get a Windows 2019 Active Directory Domain Controller install…
The boys are back in town. Jav's return has also reduced the average age of this podcast by roughly twenty years. The good news though is that we not only have a full program, but also new jingles too! This week in Infosec Liberated from the “today in infosec” twitter account: 16th January 2007: Jeffrey Goodin became the first person convicted unde…
Hackers waltzed past MFA used by CISA on cloud accounts Social media convulses after Capitol attack Google fixes bug that delayed COVID contact-tracing apps Thanks to our episode sponsor, IT Asset Management Group Are you checking your IT asset disposal vendor’s homework? Organizations should record unique IDs of each asset disposed of and reconcil…
S
Security In Five Podcast


1
Episode 903 - Ring Adds End-To-End Encryption Finally
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10
Ring is rolling out end-to-end encryption to their products. This episode talks about what this means and how it works. Source: Technical Specs From Amazon Be aware, be safe. Primary Partner - WeHackPurple.com Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security I…
T
The CyberWire Daily


1
SideWinder and South Asian cyberespionage. Project Zero and motivation to patch. CISA’s advice for cloud security. Classiscam in the criminal-to-criminal market. SolarLeaks misdirection?
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19
There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service aff…
S
Security In Five Podcast


1
Episode 902 - Questions Hackers Ask Before They Attack You
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55
Thinking like a hacker can help you protect yourself. This episode talks about the questions hackers ask before they attack a target. Source: https://threatpost.com/6-questions-attackers-ask-exploit/162651/ Be aware, be safe. Primary Partner - WeHackPurple.com Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Se…
C
Cyber Security Headlines


1
Week in Review: January 11 through 15, 2021
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12
Link to blog post This week’s Cyber Security Headlines Week in Review, January 11-15, 2021 is hosted by Steve Prentice @stevenprentice with our guest Allan Alford, @AllanAlfordinTX. Thanks to our episode sponsor, IT Asset Management Group Organizations must have adequate written policies and procedures to meet the regulatory requirements for the di…
Noa Zilberman from Checkpoint joins us to discuss the SASE ZTNA offering. Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our websit…
C
CYBER


1
The Social Media War After the Attempted Coup
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11
Parler. Gab. The President being suspended from almost every mainstream social media entity and finally prevented from engaging in his favorite addiction: Tweeting. Besides the horned Qanon shaman and the disgusting violence on Capitol Hill last week, it has been a hell of a week for social media. Motherboard EIC Jason Koebler and I break it all do…
D
Defense in Depth


1
Are our Data Protection Strategies Evolving?
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-are-our-data-protection-strategies-evolving/) As we're evolving from putting data on premises to the cloud, are our data protection strategies evolving as well? There are issues of securing data, knowing where it travels, and privacy implicati…
Europol confirms dark web marketplace takedown Google to reportedly block all political ads... again DoD halts deployment of cybersecurity system Thanks to our episode sponsor, IT Asset Management Group Are you checking your IT asset disposal vendor’s homework? Organizations should record unique IDs of each asset disposed of and reconcile their rec…
Congressional System Integrity, FBI Egregor, Parler Dox, Clearview Spike, JetBrains Speculation, Chinese Finacial APTs, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism… Support the show: https://danielmiessler.com/support/ See omnystudio.com/listener for privacy information.…
Recon/Attack Surface Management Analysis, The Pentester's BluePrint, Amazon's 10,000 Small Bets, Sunburst APT29 Hack, Data Dump on the CCP, Ransomware Makes Half of All Major Incidents, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism… Support the show: https://danielmiessler.com/support/ See…
Amazon Curate (I Wish), Tesla Hack, IoT Security Bill, Iran Assassination, Robot Dogs, Drupal, TikTok Cartels, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism… Support the show: https://danielmiessler.com/support/ See omnystudio.com/listener for privacy information.…
Tim Berners-Lee's Solid Idea, Police Looking Through Ring Cameras, Feinstein's Chinese Spy, Trump Banned 31 Chinese Companies, Microsoft on MFA, US Trolling Russian APT, Zoom Thanksgiving, Facbook Copying Snap, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism… Support the show: https://daniel…
S
Smashing Security


1
210: DC rioters ID'd, Energydots, and ransomware gets you in a pickle
1:02:59
1:02:59
Play later
Play later
Lists
Like
Liked
1:02:59
Penile penal problems, identifying rioters in Washington DC, and can a sticker protect you from radiation? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner. And don't miss our featured i…
T
The CyberWire Daily


1
Looking for that threat actor “likely based in Russia.” SolarLeaks and a probably bogus offer of stolen files. Notes on Patch Tuesday.
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21
Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell …
For the 182nd edition of the Kaspersky Transatlantic Cable Podcast, Dave and I tackle the biggest story of 2021 so far – the cyber ramifications of the insurrection at the US Capitol along with Twitter bans and more. We kick the podcast by looking into an op-ed on ZDNet about the cybersecurity fallout of last week’s storming of the Capitol. Now, wh…
Hackers leak stolen Pfizer COVID-19 vaccine data online Social media’s big terrible week Parler archived due to “mind-numbing” mistake Thanks to our episode sponsor, IT Asset Management Group Poorly managed IT asset disposal, lack of due diligence, and a disposal program without clearly defined responsible parties has now resulted in millions of do…
T
The Cybrary Podcast


1
401 Access Denied Ep. 19 | Inside a Russian Troll Farm with Jessikka Aro
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47
In 2014 Jessikka Aro was a journalist reporting on the start of the Russo-Ukrainian War when she became aware of a group of Russian citizens who were being paid to promote pro-Russia propaganda. Jessikka joins us today to discuss the influence trolls had on public opinion, as well as how she outed them and became a victim of the trolls herself. And…
T
The Cybrary Podcast


1
Hacking by the Rules: Game Changers after Y2K | The Cybrary Podcast Ep. 48
1:06:44
1:06:44
Play later
Play later
Lists
Like
Liked
1:06:44
Do better builders make better breakers? Jonathan Meyers, Josh Lospinoso, and Philip Wiley share their views and experiences with the game changers in cybersecurity over the last 20 years, and how it’s helped and hindered people trying to enter the space. In this episode, they cover everything from rapid iteration and continuous learning, to the va…
S
Security In Five Podcast


1
Episode 901 - Google Titan Key Can Be Cloned, But I Wouldn't Worry About It Too Much
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
Security researchers reported they were able to clone Google's Titan Security Key. The Titan is a hardware device to greatly improve multi-factor authentication. This episode talks about how the researchers were able to clone it and why you shouldn't be too worried about this or stop using your Titan keys. Be aware, be safe. Primary Partner - WeHac…
T
The CyberWire Daily


1
Cyberespionage campaign hits Colombia. New malware found in the SolarWinds incident. Mimecast certificates compromised. Ubiquiti tells users to reset passwords. Two wins for the good guys.
24:26
24:26
Play later
Play later
Lists
Like
Liked
24:26
A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief…