Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Deception, influence, and social engineering in the world of cyber crime.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Daily update on current cyber security threats
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
The latest on cybersecurity threats and news from FireEye.
The Government and Popular Culture
Information Security is the name of the game. Don't let the hackers win!
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
Thinking about the intersection of security, technology, and society—and what might be coming next. A curated 15-30 minute summary of the week's most important stories and ideas every Monday, and periodic essays and guest appearances that explore a single topic.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
With nearly 300 million books in print and countless topics covered, the iconic For Dummies book series revolutionized learning by making complex subjects easy to understand. Now each week, FOR DUMMIES: The Podcast, hosted by Eric Martsolf, will explore one of the For Dummies titles in their approachable, fun style. From cryptocurrency to wine, sex to cybersecurity, forensics to Fortnite, and everything in between. Send your questions or comments to: firstname.lastname@example.org DUMMIES C ...
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Penetration testing for Fortune 50 companies since 2008.
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
An information security focused group of individuals from all walks of life
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
State of the Hack discusses the latest in information security, digital forensics, incident response, cyber espionage, APT attack trends, and tales from the front lines of significant targeted intrusions.
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest developments and bring you behind the scenes with the people who were there. New episodes every Wednesday.
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
Prevelance of DNS Spoofing https://arxiv.org/abs/2011.12978 New npm Malware Includes Bladabindi Trojan https://blog.sonatype.com/bladabindi-njrat-rat-in-jdb.js-npm-malware DarkIRC Bot Exploits Recent Oracle WebLogic Vulnerablity https://blogs.juniper.net/en-us/threat-research/darkirc-bot-exploits-oracle-weblogic-vulnerability…
CyberArk has released the industry’s first AI-powered cloud security service with a privilege-first approach to reducing excessive permissions. This interview with Thomas Fikentscher, Regional Director ANZ of CyberArk delves into the privilege first-approach and how identity is the new perimeter. Recorded for MySec.TV, 27 November 2020 #CyberArk #P…
Fears are raised about cyber bioterrorists, there's a widespread blackout for IoT devices caused by a cloud cock-up, and why role do strippers play in a revamp of the United States's computer crime laws. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and …
Happy December! Today I virtually sat down with Christopher Fielder of Arctic Wolf, who started his career in security at 18 (I was just playing a lot of video games when I was that old)! Christopher has served in the Air Force, worked for a university and SANS, served for some three-letter organizations - and more! Christopher and I had a great ch…
This week, we're going to take on a different aspect of the cybersecurity skills gaps in this episode. Namely, the lack of diversity in our industry when it comes to African Americans and what can we all do about it. To facilitate the discussion today we are joined by AJ Yawn, who is a founding board member of the National Association of Black Comp…
A deepfake bot has been generating explicit, non-consensual images on the platform. The researchers who found it say their warnings have been ignored.
Today's podcast reports on countries ranked for data theft, the discovery of data found open on the Internet, a possible sign of cyber espionage and two sent to prison for cyber-related scamsBy ITWC
Generic smart doorbells, Tesla Model X key fobs, critical Drupal flaw, Spotify. Chrome Omnibox becomes more Omni. Chrome's open tabs search. Ransomware news involving Delaware County, Canon, US Fertility, Ritzau, Baltimore County Public Schools, and Banijay group SAS. Drupal's security advisory titled "Drupal core - Critical - Arbitrary PHP code ex…
Originally aired on November 30, 2020 Articles discussed in this episode: https://www.computerweekly.com/news/252491324/Surge-in-Ryuk-ransomware-attacks-has-hospitals-on-alert https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-what-to-know-schools-ransomware-attack-20201130-2j3ws6yffzcrrkfzzf3m43zxma-story.html https://www.darknet.org.…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/why-is-pay-the-ransom-in-next-years-budget/) With 25 percent of ransomware victims paying the ransomware, have we waved the white flag to the attackers? Should we just budget for it? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO …
The global transition to 5G mobile technology is well underway, with ongoing network build-out and increased availability of 5G enabled devices able to take advantage of the increased speed and capacity of the next generation network. The transition has attracted an odd type of controversy, primarily from conspiracy theorists who claim that 5G is r…
Dive into all things Apple security with today’s guest, Kelli Conlin, Security Solutions Specialist at Jamf. Learn about securing devices across multiple operating systems, the hidden-in-plain-sight Apple security Bible, and why Kelli’s mom isn’t allowed to use the 15-year-old Mac laptop Kelli is still hanging on to after all these years. – Enter c…
The end of the year is right around the corner. Time to start thinking about next year. We’re also adding another tool to our toolkit. FIND US ON 1. Facebook 2. Twitter - DamienHullBy SECTION 9
The Department of Homeland Security is one of the biggest agencies of the US government, and has a highly active...By Tom Secker
This week I discuss Big Sur VPN updates, Amazon's new Sidewalk "feature", and a summary of the Black Friday deals for privacy enthusiasts.Direct support for this podcast comes from sales of my books and the new online OSINT video training. More details can be found at IntelTechniques.com and IntelTechniques.net. Your support eliminates any ads, spo…
The latest edition of the ISMG Security Report features an analysis of how cybercriminals are ditching banking Trojans in favour of ransomware attacks. Also featured: Defending against deepfakes; supporting a dispersed workforce.By CareersInfoSecurity.com
In this interview Jenny talks to Chief Innovation Security Officer at Spirion, Gabe Gumbs. Gabe discusses his 20 year career in the Information Security Industry including his early career working to retrieve information, to his current role protecting it. Thank you Gabe, for a great interview. To follow Gabe on LinkedIn, click the link here. To fo…
Overview This week we look at updates for c-ares, PulseAudio, phpMyAdmin and more,plus we cover security news from the Ubuntu community including planningfor 16.04 LTS to transition to ESM, libgcrypt FIPS cerified for 18.04 LTSand a proposal for making home directories more secure for upcoming Ubuntureleases as well. This week in Ubuntu Security Up…
How do you go from pentester to creator of Microsoft’s bug bounty program? Find out from hacker and vulnerability disclosure pioneer, Katie Moussouris. Join us for a fascinating interview with Katie about her journey, the bugs in bug bounty programs, and the people who inspired her along the way.With Kimberly Truong and special guest Katie Moussour…
Matt Lewis, research director at NCC Group discloses serious security and privacy in 11 different smart doorbells, which could be exploited by attackers to physically switch off the devices.By Mike Mimoso, Chris Brook
In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. There are multiple stories about APT groups to cover this week, including our own Threat Intel blog detailing a wide-ranging attack campaign that targeted Japan-linked companies in multiple sectors…
Organizations need to build security into their cloud environments to help thwart cyberthreats, says Tom Corn of VMware, who describes this "intrinsic security" approach.By InfoRiskToday.com
By FireEye Inc,
CISA says US elections were secure, that recounts are to be expected in tight races. (But election-themed malspam continues, of course.) A news platform is flagged as a GRU front. A new ransomware strain takes payment through an Iranian Bitcoin exchange. The Jupyter information-stealer is out and active. David Dufour on detecting deepfakes and misi…
Is iOS really more secure than Android, and why? What are the pros and cons of biometric authentication? How can you know which apps are safe to use, anyway? In this episode we dive into a range of mobile security issues. Who better to answer our questions than a couple of mobile experts? F-Secure's Ken Gannon and Ben Knutson join the show to discu…