Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays, Prof G Markets breaks down what’s moving the capital markets, teaching the basics of financial literacy so you can build economic security. Wednesdays, during Office Hours, Scott answers your questions about business, career, and life. Thursdays, Scott has a conversation with a blue-flame thinker in the innovation economy. And Scott closes ...
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Weekly long-form conversations with fascinating people at the creative edges of national security. Unscripted. Informal. Always fresh. Chatter guests roll with the punches to describe artistic endeavors related to national security and jump into cutting-edge thinking at the frontiers where defense and foreign policy overlap with technology, intelligence, climate change, history, sports, culture, and beyond. Each week, listeners get a no-holds-barred dialogue at an intersection between Lawfar ...
…
continue reading
This Week in Immigration gives you a rundown of key immigration issues. Experts from the Bipartisan Policy Center discuss and analyze all that is new and noteworthy on immigration policy.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, Week in Review for week ending July 5, 2024
24:36
24:36
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
24:36
This episode features an interview with a cybersecurity and privacy lawyer about responding to cyber attacks Navigating Ransomware Response: Insights from Cybersecurity Expert Imran Ahmad In this episode features an interview between Howard Solomon and Imran Ahmad, a partner at Norton Rose Fulbright, discussing effective strategies for managing ran…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017. Doug talks about how to count from zero to one! Show Notes: https://securityweekly.com/vault-swn-18
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Jailbreaking is Real!
42:18
42:18
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
42:18
Mitigating Skeleton Key is a new type of generative AI jailbreak techniqueDoor Carl Franklin
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: CDK Blacksuit developments, Criminal nuclear failures. U.S. Kaspersky ban
22:45
22:45
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
22:45
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jim Bowie, CISO, Tampa General Hospital Thanks to our show sponsor, Prelude Security When executives ask the question, are we vulnerable to this threat? How long does it take you to get a confident answer? Prelude automatically transform…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The TeamViewer Breach and a Busy Week for APT29
10:07
10:07
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
10:07
Dennis Fisher and Lindsey O'Donnell-Welch dig into the news of the TeamViewer corporate breach, attributed to APT29/Midnight Blizzard, and news of more victims from the Microsoft intrusion by the same group earlier this year.Door Decipher
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shared Responsibility Models, AI in Offensive Security, Apple's Private Cloud Compute - ASW #289
24:10
24:10
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
24:10
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
In this interview, we speak with Mac Munsayac, Head of Customer Experience at Philippine Airlines, to explore the transformative role of AI in the aviation industry. Mac elaborates on the integration of generative AI and tools to enhance customer interactions by providing personalized, proactive, and frictionless experiences, especially in scenario…
…
continue reading
JFrog Webinar; Big Bank Cyber Warfare; AI Can’t Count; Disclosure Notices Galore; The State of Data Breaches, Part 2; Sponsored by Report URI https://www.troyhunt.com/weekly-update-407/ See omnystudio.com/listener for privacy information.Door Troy Hunt
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017. Doug talks about how to count from zero to one! Show Notes: https://securityweekly.com/vault-swn-18
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hackers Compromise Gala Games. $22M In Crypto Stolen. Anoop Nannra, Co-Founder & CEO, Trugard.
27:28
27:28
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
27:28
Anoop Nannra, CEO and Co-Founder of Trugard, is an industry-recognized blockchain leader focused on improving cybersecurity and due diligence in Web3. He is also featured on our list of Cybersecurity Pundits. In this episode, Anoop joins host Paul John Spaulding to discuss the recent breach of Gala Games and the $22 million in crypto that hackers s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Going Passwordless. The Future Of Secure Logins. Lakshmi Sharma, Chief Product Officer, Hawcx.
10:25
10:25
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
10:25
Lakshmi Sharma is the Chief Product Officer at Hawcx. In this episode, she joins host Heather Engel to discuss going passwordless, including why passwordless authentication may be the future for secure logins, how effective this method is in preventing data breaches, and whether there are any drawbacks. • For more on cybersecurity, visit us at http…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Breaches & Ransomware. An Expert's Cybersecurity Journey. Vinny Troia, Night Lion Security.
19:47
19:47
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
19:47
Vinny Troia, a lifelong hacker, cybersecurity PhD, author of the book “Hunting Cyber Criminals”, and CEO of Night Lion Security, has developed a career in understanding and forming relationships throughout the dark web. He is also featured on our list of Cybersecurity Pundits. In this episode, Troia joins host Paul John Spaulding to discuss his bac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jul. 5, 2024. Franklin County, Wash. Hit By Cyberattack. WCYB Digital Radio.
2:03
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss software transparency. Supply Chain Q&A is sponsored…
…
continue reading
Overview This week we deep-dive into one of the best vulnerabilities we’ve seen in a longtime regreSSHion - an unauthenticated, remote, root code-execution vulnerabilityin OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,FontForge, OpenVPN and a whole lot more. This week in Ubuntu Security Updates 39 unique CVEs addressed [USN-684…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: David Rubenstein, Dean Ball, and Alan Rozenshtein on AI Federalism
45:33
45:33
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
45:33
Alan Rozenshtein, Associate Professor of Law at the University of Minnesota Law School and a Senior Editor at Lawfare; David Rubenstein, James R. Ahrens Chair in Constitutional Law and Director of the Robert J. Dole Center for Law and Government at Washburn University School of Law; and Dean Ball, Research Fellow at George Mason University's Mercat…
…
continue reading
A report on business email compromise attacks is highlighted in this editionDoor Howard Solomon
…
continue reading
Senate leader demands answers from CISA re March Ivanti hack China’s Velvet Ant hackers exploiting new Cisco zero-day Europol law enforcement takes down Cobalt Strike servers Huge thanks to our sponsor, Demoed Buyers do 70% of their product research before talking to a company. That blew our minds. Why not give buyers as much information about your…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The “Gluten-Free Clam Pizza is the Best Pizza” Edition
1:09:34
1:09:34
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:09:34
This week, a Scott-less Alan and Quinta sat down with Lawfare Tarbell Fellow Kevin Frazier and law school-bound Associate Editor Hyemin Han to talk over the week’s big national security news, including: “I will not make age an issue of this campaign. I am not going to exploit, for political purposes, my opponent's youth and inexperience.” Unlike Ro…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rational Security: The "Gluten-Free Clam Pizza is the Best Pizza" Edition
1:09:34
1:09:34
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:09:34
This week, a Scott-less Alan and Quinta sat down with Lawfare Tarbell Fellow Kevin Frazier and law school-bound Associate Editor Hyemin Han to talk over the week’s big national security news, including: “I will not make age an issue of this campaign. I am not going to exploit, for political purposes, my opponent's youth and inexperience.” Unlike Ro…
…
continue reading
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
This Week In Tech. Nvidia Takes Tech Crown, Microsoft Breaches Antitrust Rules. WCYB Digital Radio.
2:23
The Cybercrime Magazine Podcast brings you our weekly alert, which provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with the latest breaking news stories we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Airs weekly on WCYB Digital Radi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Archive: Seamus Hughes and Alan Rozenshtein on the January 6 Charges
52:08
52:08
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
52:08
From March 22, 2021: Benjamin Wittes sat down on Lawfare Live with Seamus Hughes, the deputy director of the Program on Extremism at George Washington University, and Alan Rozenshtein, a Lawfare senior editor and professor at the University of Minnesota Law School, to talk about the group of cases that have been filed in connection with the January…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Cast & Crew of Sound of Hope: The Story of Possum Trot
1:21:14
1:21:14
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:21:14
For a special holiday episode, Adam sits down for a live post-screening conversation at the Improv in Irvine, CA with the Cast & Crew behind the Angels Studio film Sound of Hope: The Story of Possum Trot. The roster of talent includes Director/Co-writer Joshua Weigel, co-writer Rebekah Weigel, cast members Demetrius Grosse, Nika King, and Diaana Ba…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: Where oh where in the world is that information?
47:51
47:51
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
47:51
George Tziahanas from Archive360 is talking about what happens when the information is no longer in boxes but could be anywhere in the world. Ben has the story of a raid on an independent journalist who leaked unaired clips from Fox News. Dave's got the story of a DC court ruling that AI generated content is not eligible for copyright protection. W…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Defensive Security Podcast Episode 271
56:58
56:58
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
56:58
Door Jerry Bell and Andrew Kalat
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bridging The Gap. Cybersecurity & Boardroom Confidence. Karen Worstell, CEO, W Risk Group.
11:24
11:24
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
11:24
Karen Freeman Worstell, CEO of W Risk Group and founder of MOJO Maker for Women in Tech, has been a cybersecurity trailblazer since the early 1990s. In this episode, she joins host Heather Engel to discuss board communications and the loss of confidence in cybersecurity strategies, including qualitative vs. quantitative risk, how security teams can…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Black Hat To White Hat. Ex-Hacker Now Fights Cybercrime. Bastien Treptel, CTRL Group.
26:10
26:10
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
26:10
Bastien Treptel, co-founder and chief product officer at CTRL Group, is a former criminal hacker who breached a major Australian bank as a teenager, granting him access to 40,000 credit card numbers and other sensitive customer data. These actions ultimately led Treptel to be apprehended by Australian Federal Police, though he was not charged. In t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Weekly: TeamViewer Supply Chain Attack, MOVEit Horrors, Medusa Ransomware Case Study
36:57
36:57
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
36:57
In this episode of ShadowTalk, hosts Chris and Kim, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include: TeamViewer compromise by APT29 in supply chain attack MOVEit in the headlines again, critical severity vulnerability disclosed Popular Content Delivery Network (CDN) providers compromised in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity In Perspective. Endpoint Security Solutions. John Pelton & Steve Fielder, Optiv.
16:38
16:38
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
16:38
John Pelton is the Senior Director of Managed Detection & Response at Optiv, and Steve Fielder is the Sr. Director of Managed Engineering at Optiv. In this episode, Pelton and Fielder join host Melissa O'Leary to discuss EPP and EDR solutions, including what businesses should consider when evaluating the vendor landscape, whether companies are bett…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jul. 3, 2024. Australian Banks Under Constant Cyberattack. WCYB Digital Radio.
2:47
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawfare Daily: Anupam Chander, Kyle Langvhardt, and Alan Rozenshtein on the Supreme Court's Decision in Moody v. NetChoice
52:41
52:41
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
52:41
Anupam Chander, Scott Ginsburg Professor of Law and Technology at Georgetown Law; Kyle Langvhardt, Assistant Professor at the Nebraska College of Law; and Alan Rozenshtein, Senior Editor at Lawfare and Associate Professor at Minnesota Law, join Kevin Frazier, Assistant Professor at St. Thomas University College of Law and a Tarbell Fellow at Lawfar…
…
continue reading
This episode reports on some of the new ways threat actors are bypassing phishing defencesDoor Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Defense Industry, Greatness Is in the Agency of Others, and What to Do When Your Partner Makes More Money Than You
19:50
19:50
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
19:50
Scott speaks about the defense tech industry, specifically why he believes it is a great business. He then discusses how greatness is in the agency of others, particularly in the context of the workplace. He wraps up with advice to a listener about how to act if your partner makes more money than you. Music: https://www.davidcuttermusic.com / @dcut…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
JESUS TREJO + ZACH JUSTICE
2:05:50
2:05:50
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
2:05:50
Comedian Jesus Trejo makes his first visit to the show. They open by discussing Jesus’ upbringing in Long Beach, CA, the Latino comedy stars that inspired him as a kid and Adam’s early attempts to get into radio.Next, Mike Dawson joins to read the news including the uproar surrounding OJ Simpson being included in an awards show In Memoriam tribute …
…
continue reading
Evolve Bank data breach is evolving Patelco Credit Union cyberattack disrupts services for nearly 500,000 members LockBit claims cyberattack on Croatia’s largest hospital Huge thanks to our sponsor, Demoed Did you know that Demoed is the first platform that allows you to watch a live product demo and ask questions without receiving a barrage of fol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risky Business #755 -- SSH 0day! Polyfill drama! Entrust crushed!
59:19
59:19
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
59:19
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risky Business #755 -- SSH 0day! Polyfill drama! Entrust crushed!
59:19
59:19
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
59:19
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 981: The End of Entrust Trust - Open SSH Vulnerability, SyncThing, Endtrust
2:27:44
2:27:44
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
2:27:44
The regreSSHion Bug 50BTC moved Voyager 1 Update Email @ GRC SyncThing DNS queries Recall The End of Entrust Trust Show Notes - https://www.grc.com/sn/SN-981-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Off The Wall - Jul 02, 2024
1:01:28
1:01:28
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:01:28
Door Emmanuel Goldstein
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chatter: The Librarians Who Saved Books in World War II, with Kathy Peiss
1:12:16
1:12:16
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
1:12:16
As the Second World War started, an unsung cadre of US librarians and other information management professionals was making its way to Europe to acquire printed material that could help American analysts understand international threats. As the war went on, the mission of these experts expanded to also include an unprecedented effort to locate, pre…
…
continue reading