Join Tenzin Wangyal Rinpoche, other CyberSangha® hosts, and invited guests for illuminating teachings, guided meditations, and science/spirituality dialogs.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Stand-Up Comic and host of ESPN's Sportscenter on Snapchat, Cy Amundson, brings comedy and sports together in hilarious hour-long podcast episodes.
…
continue reading
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
theCUBEresearch principal Cybersecurity analyst Jon Oltsik hosts the newest SiliconANGLE podcast focusing on bridging the gap between Cybersecurity and all other parts of tech
…
continue reading

1
DarkWeb.Today – Hackers and Cyber Security, Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email PodcastPartnerships@Studio71us.com We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email spollock@mcdonaldhopkins.com
…
continue reading
บอกเล่าเรื่องราวในโลกไอทีมาอยู่หน้าไมค์
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
In this episode of The Cy Amundson Show, we're down a couple of daddies but still serving up some hot delicious sports talk for your afternoon commutes, including plenty of NFL & Quarterback talk! SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cyamundson), Blake Wexle…
…
continue reading
This week, Chad fixes his golf swing and Cy loses a bet to Louis Lee. Head on over to Chad's YouTube page to watch this episode! ALSO! We're doing a LIVE Middle Of Somewhere in Fort Collins next month! Grab your tickets to see Chad & Cy here! This episode is brought to you by PrizePicks! --- Follow us on Instagram! Chad Daniels (@ThatChadDaniels) i…
…
continue reading

1
System and Communications Protection | Guide To NIST 800-171
12:25
12:25
Spill senere
Spill senere
Lister
Lik
Likt
12:25Welcome to episode fourteen of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @sec…
…
continue reading

1
Check Point Breach: A Storm in a Coffee Cup… or Something Much Bigger?
6:56
6:56
Spill senere
Spill senere
Lister
Lik
Likt
6:56We dive into the murky case of the alleged Check Point Software breach—what hackers claim they stole, why the company says it's "handled," and why that may not be the whole truth. From admin access screenshots to quiet cover-ups, Darnley unpacks the risks and ask the tough questions security firms don’t want you asking. Pour yourself a strong cup a…
…
continue reading

1
Aviv Madmon Founder and CEO @Experda about Data/AI/Cyber and everything in-between & mindset change
58:09
58:09
Spill senere
Spill senere
Lister
Lik
Likt
58:09דאטה, בעולם שבו כמויות המידע מכפילות את עצמן כמעט על בסיס יומי ומשמשות אבן יסוד בהתנהלות הארגונית הצורך בכלי ניתוח הולך וגובר ומהווה לעיתים נקודת חולשה בהגנת הסייבר של הארגון. נחשון פינקו מארח את אביב מדמון מקים שותף ומנכ"ל אקספרדה בשיחה על דאטה, מאגרי מידע, כלי ניתוח ואיך לצמצם סיכונים ומשטחי תקיפה לנכס החשוב ביותר בארגון. עד כמה אנחנו מבינים את ח…
…
continue reading

1
Twitter Space Conversation: Georgia Protests and Anonymous Activism
1:40:12
1:40:12
Spill senere
Spill senere
Lister
Lik
Likt
1:40:12Twitter Space Conversation: Georgia Protests and Anonymous Activism Date: April 9–10, 2025 Host: Alberto Daniel Hill (@ADanielHill) Participants: The One With The Rebellious Soul (@Rebellious1Ws), SPYDIR (@AnonSpyDir), Tariq (@Tariq31997500), GoldStarGwei (@GoldStarGwei), and others The Space was a raw, passionate chat about Georgia’s struggle agai…
…
continue reading

1
OCC major incident, Oracle confirms hack, Smokeloader servers seized
8:23
8:23
Spill senere
Spill senere
Lister
Lik
Likt
8:23U.S. Comptroller suffers ‘major incident’ Oracle confirms "obsolete servers" hacked Police seize Smokeloader malware servers and detain customers Thanks to our episode sponsor, Nudge Security Nudge Security is the only solution for SaaS security and governance that can discover up to two years of historical SaaS spend along with usage insights so y…
…
continue reading

1
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
6:35
6:35
Spill senere
Spill senere
Lister
Lik
Likt
6:35Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
…
continue reading

1
Cyber Defense Radio – Aviv Mussinger – Kodem Security – Hotseat – Podcast – 2025
19:04
19:04
Spill senere
Spill senere
Lister
Lik
Likt
19:04Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this engaging episode features Aviv Mussinger, CEO & Co-founder of Kodem Security, a groundbreaking platform revolutionizing application security for the modern development lifecycle. Learn more at www.kodemsecurity.com. Kodem is on a mission to make security a core part of application …
…
continue reading

1
Cybersecurity Recruiter/Founder talks Entrepreneurship, Startups, and the state of the Job Market.
38:20
38:20
Spill senere
Spill senere
Lister
Lik
Likt
38:20Josh Keeley is a Co-Founder of Trident Search, a cybersecurity recruiting agency specializing in early state cybersecurity startups. He talks about his journey as an entrepreneur, cybersecurity startups, and the current state of the job market.Av RealTime Cyber
…
continue reading

1
Emergency TV Message During Curfew - V for Vendetta (2005) - Movie Clip HD Scene
4:00
4:00
Spill senere
Spill senere
Lister
Lik
Likt
4:00Emergency TV Message During Curfew - V for Vendetta (2005) - Movie Clip HD Scene “I know his name was Guy Fawkes, and I know in 1605 he attempted to blow up the Houses of Parliament. But who was he really? What was he like? What kind of things made him laugh? Or had he ever been in love? We are told to remember the idea and not the man, because a m…
…
continue reading

1
Beginning Opening First Scene Remember Remember - V for Vendetta (2005) - Movie Clip HD Scene
2:34
2:34
Spill senere
Spill senere
Lister
Lik
Likt
2:34Beginning Opening First Scene Remember Remember - V for Vendetta (2005) - Movie Clip HD Scene Fair use. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that…
…
continue reading

1
Embracing Exhaustion, Cultivating Resting with Awareness
45:10
45:10
Spill senere
Spill senere
Lister
Lik
Likt
45:10Episode 18, Series 1: "Embracing Life with Wisdom & Compassion" Featuring: Tenzin Wangyal Rinpoche In a live online teaching, Tenzin Wangyal Rinpoche guides us in meeting any sense of exhaustion or burnout we may be experiencing with openness and warmth, clearing and opening the pathways to abiding deeply and restfully in open awareness. The broadc…
…
continue reading

1
SANS Stormcast Wednesday, April 10th: Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet
7:19
7:19
Spill senere
Spill senere
Lister
Lik
Likt
7:19Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
…
continue reading

1
Critical Security Updates and Identity Management Insights
11:13
11:13
Spill senere
Spill senere
Lister
Lik
Likt
11:13In this episode of Cybersecurity Today, host Jim Love covers important security updates and warnings including critical flaws in WinRAR, a patch for a high severity zero-day vulnerability in Windows CLFS, and a security vulnerability in WhatsApp's Windows desktop application. He urges users to update their software to protect against exploits. Addi…
…
continue reading

1
New WhatsApp vulnerability, Microsoft patches 125 Windows Vulns, Fake Microsoft Office add-in tools push malware
7:09
7:09
Spill senere
Spill senere
Lister
Lik
Likt
7:09WhatsApp vulnerability could facilitate remote code execution Spyware targeting Chinese diaspora Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day Thanks to our episode sponsor, Nudge Security Nudge Security provides advanced security posture management for Okta, Microsoft 365, Google Workspace, and other critical apps. With Nu…
…
continue reading

1
Balancing Risk, Resilience and AI in Security - Ep 144
26:25
26:25
Spill senere
Spill senere
Lister
Lik
Likt
26:25In this episode of Reimagining Cyber, host Tyler Moffitt welcomes Tim Armandpour from PagerDuty to explore how organizations can assess and manage their cyber risk in an era of rapid technological change. They discuss the importance of continuous risk evaluation, building a culture of resilience, and the impact of AI on security practices. Tim shar…
…
continue reading

1
Episode 4- Oracle Under Fire: Data Breaches and the Legal Tightrope. A Conversation with Thomas Ritter
17:22
17:22
Spill senere
Spill senere
Lister
Lik
Likt
17:22In this episode of "Cyber Survivor," host Dan Dodson and legal expert Thomas Ritter delve into the recent cyber incidents involving Oracle Health. They discuss Oracle's handling of potential data breaches linked to both Oracle Cloud and legacy servers from the Cerner acquisition. While Oracle has contacted some clients privately, it has not publicl…
…
continue reading
What if your DNA could be hacked like software? In this episode of Darnley’s Cyber Café, we explore a groundbreaking advancement that blurs the line between cybersecurity and biology. Is this the key to human evolution—or a new frontier for cybercrime? Tune in to uncover the truth. Click here to send future episode recommendation Support the show S…
…
continue reading

1
Cyber, Space, and the Future of Warfare with Rep. Mike Rogers
38:31
38:31
Spill senere
Spill senere
Lister
Lik
Likt
38:31In this episode of Cyber Focus, host Frank Cilluffo speaks with Congressman Mike Rogers, Chairman of the House Armed Services Committee. Representing Alabama’s 3rd District, Rogers outlines his top defense priorities, including boosting defense spending, acquisition reform, and preparing for cyber and space warfare. He also shares insights on missi…
…
continue reading

1
The Undetected. Espionage and Spies.(Part 2)
30:23
30:23
Spill senere
Spill senere
Lister
Lik
Likt
30:23Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Insi…
…
continue reading

1
Resilient Cyber w/ Jit - Agentic AI for AppSec is Here
28:03
28:03
Spill senere
Spill senere
Lister
Lik
Likt
28:03In this episode, we sit down with David Melamed and Shai Horovitz of the Jit team. We discussed Agentic AI for AppSec and how security teams use it to get real work done. We covered a lot of key topics, including: What some of the systemic problems facing AppSec are, even before the widespread adoption of AI, such as vulnerability prioritization, s…
…
continue reading

1
The Power of Process: Create a Company That Runs Without You with Adi Klevit
38:38
38:38
Spill senere
Spill senere
Lister
Lik
Likt
38:38In this episode… Building a company that runs smoothly without constant supervision is the dream of every business owner—but few achieve it. Adi Klevit reveals how documenting and implementing the right processes can transform a fast-growing company from chaotic to calm. She breaks down her eight-step system, starting with the leadership mindset ne…
…
continue reading

1
Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
9:56
9:56
Spill senere
Spill senere
Lister
Lik
Likt
9:56In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
…
continue reading

1
23andMe Bankruptcy: What Happens to Your Data?
21:50
21:50
Spill senere
Spill senere
Lister
Lik
Likt
21:50Send us a text With 23andMe’s recent bankruptcy filing, questions about what happens to your genetic data are more pressing than ever. Jason Pufahl and Michael Grande dive into the company’s infamous data breach, the implications of exposed genetic information, and steps you can take to protect—or delete—your data. Along with Rob McWilliams and Bri…
…
continue reading

1
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
17:34
17:34
Spill senere
Spill senere
Lister
Lik
Likt
17:34Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of Cyberside Chats, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent …
…
continue reading

1
Apple encryption appeal, Xanthorox AI tool, weaponizing CRM
7:22
7:22
Spill senere
Spill senere
Lister
Lik
Likt
7:22Apple appeals UK encryption back door order Researchers warn about AI-driven hacking tool PoisonSeed campaign weaponizes CRM system Thanks to our episode sponsor, Nudge Security Nudge Security discovers every GenAI tool ever used in your org, even those you’ve never heard of. For each tool, you’ll see who introduced it, who else is using it, where …
…
continue reading

1
teissTalk: Resilient by design – the next cyber-security imperative
45:36
45:36
Spill senere
Spill senere
Lister
Lik
Likt
45:36Identifying and removing barriers to cyber resilience Reducing complexity - consolidating and eliminating legacy systems Building a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/ Heather Lowrie, Independent Advisor, Earthgard Ltd https:…
…
continue reading
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
…
continue reading
Tax season is a stressful time for many in the US, and this creates the perfect opportunity for a number of scams against virtually anyone living in the US. Be aware of fake documents, fake filing services, and unusual emails. Sources: https://pastebin.com/zJQGMndkAv Chloe Thonus
…
continue reading

1
Defending Global Gaming: Mohegan’s Battle Plan for Cybersecurity
47:17
47:17
Spill senere
Spill senere
Lister
Lik
Likt
47:17In This Episode Mark Rosa opens with an overview of Mohegan Gaming and Entertainment’s massive reach, from Connecticut to Korea. Despite global expansion, the organization remains deeply rooted in its tribal culture—the Spirit of Aquai—which emphasizes cooperation, respect, and community. This spirit doesn’t just guide guest services; it’s woven in…
…
continue reading

1
Ευθυμία Δεσποτάκη (Πνεύματα) και Ελευθέριος Κεραμίδας (Γιοί της Στάχτης)
1:19:31
1:19:31
Spill senere
Spill senere
Lister
Lik
Likt
1:19:31Στο προηγούμενο επεισόδιο είχαμε την εκπληκτική συγκυρία να μας διορθώσει σε σχόλια ο Ελευθέριος Κεραμυδάς τις ημέρες που είχα ξεκινήσει το δεύτερο βιβλίο της τριλογίας του. Οπότε κάπως έτσι ξεκινήσαμε την προετοιμασία του επεισοδίου μαζί με τη σύζυγο του, Ευθυμία Δεσποτάκη, η οποία επίσης έχει γράψει λογοτεχνία του φανταστικού. Τηρούμε τη "παράδοσ…
…
continue reading

1
NSA Haugh fired, New WinRAR flaw, ChatGPT fake passport
7:24
7:24
Spill senere
Spill senere
Lister
Lik
Likt
7:24Haugh fired from leadership of NSA and Cyber Command WinRAR flaw bypasses Windows Mark of the Web security alerts Researcher creates fake passport using ChatGPT Thanks to our episode sponsor, Nudge Security Nudge Security helps you mitigate security risks stemming from SaaS sprawl by discovering every SaaS account ever created by anyone in your org…
…
continue reading

1
Tax Time Accelerates Phishing Attacks and Cybersecurity Expert Falsifies Credentials: Cyber Security Today for April 7, 2025
8:50
8:50
Spill senere
Spill senere
Lister
Lik
Likt
8:50In this episode of Cybersecurity Today, host David Shipley covers a range of crucial issues. With tax day approaching, Microsoft reports a rise in sophisticated tax-themed phishing campaigns. The IRS has issued a warning against using its name in phishing simulations to avoid legal repercussions. Furthermore, cybersecurity journalist Brian Krebs re…
…
continue reading

1
The Undetected. Espionage and Spies.(Part 1)
31:08
31:08
Spill senere
Spill senere
Lister
Lik
Likt
31:08There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Send us a text Growth without Interruptio…
…
continue reading

1
Anonymous declares cyber war on Georgia's illegitimate government
2:16
2:16
Spill senere
Spill senere
Lister
Lik
Likt
2:16Anonymous declares cyber war on Georgia's illegitimate government This was 4 months ago, what happened after that? You will hear it from Anonymous! I'm hosting Unveiling the Truth of #FreeGeorgia: . Make sure to attend it on April 9. #FreeGeorgia #Anonymous #TruthUnveiled #GeorgiaProtests #OpGeorgia #NoToRussia #NoToRussianRegime @YourAnonSurge_ @R…
…
continue reading

1
SANS Stormcast Monday April 7th 2025: New Username Report; Quickshell Vulnerability; Apache Traffic Director Request Smuggeling
6:14
6:14
Spill senere
Spill senere
Lister
Lik
Likt
6:14New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
…
continue reading

1
Defensive Security Podcast Episode 302
1:12:02
1:12:02
Spill senere
Spill senere
Lister
Lik
Likt
1:12:02In this episode, Jerry and Andrew discuss various cybersecurity topics, including the recent Oracle Cloud security breach, a GitHub supply chain attack, insider threats, and the implications of AI in cybersecurity. They explore the challenges of maintaining trust in cloud services, the complexities of insider threats, and the evolving landscape of …
…
continue reading

1
PowerSchool Exposed-🔥-Children at Risk at School
28:48
28:48
Spill senere
Spill senere
Lister
Lik
Likt
28:48🚨New Episode 🚨We dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importance of transparency, accountability, and robust cybersecurity measures in protecting sensitive information. Takeaways Cybe…
…
continue reading
Este es un audio de guv.eth donde confirma que hackeo el CMS del sitio web de @elpaisuy - portal de noticias mas importante (a mi criterio) junto con @ObservadorUY del Uruguay --- Este audio no esta editado ni sacado de contexto, lo puedo garantizar.Hay que escuchar a la otra para para conocer lo que @elpaisuy comenta sobre este tema. Quedaré esper…
…
continue reading

1
Cybersecurity Month-End Review: Oracle Breach, Signal Group Chat Incident, and Global Cybersecurity Regulations
48:19
48:19
Spill senere
Spill senere
Lister
Lik
Likt
48:19In this episode of the cybersecurity month-end review, host Jim Love is joined by Daina Proctor from IBM in Ottawa, Randy Rose from The Center for Internet Security from Saratoga Springs, and David Shipley, CEO of Beauceron Security from Fredericton. The panel discusses major cybersecurity stories from the past month, including the Oracle Cloud bre…
…
continue reading

1
Week in Review: Microsoft’s account bypass, CrushFTP CVE clash, 23andMe warning
31:04
31:04
Spill senere
Spill senere
Lister
Lik
Likt
31:04Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Howard Holton, COO and industry analyst, GigaOm Thanks to our show sponsor, Qualys Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in cl…
…
continue reading

1
Introducing the Cyber Culture Cafe Series with Andy Lalaguna and John Moretti
33:24
33:24
Spill senere
Spill senere
Lister
Lik
Likt
33:24Cybersecurity isn't just about platforms and processes—it’s about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with …
…
continue reading

1
Episode 130: Using Deception Technology to Detect Cyber Attacks
46:31
46:31
Spill senere
Spill senere
Lister
Lik
Likt
46:31In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools allow you to detect threat actors earlier in their attack sequence, disrupt malicious activities, and mitigate potential damage to your organization. Joi…
…
continue reading

1
Cyber Defense Radio - Ravid Circus - Seemplicity - Hotseat - Podcast - 2025
14:43
14:43
Spill senere
Spill senere
Lister
Lik
Likt
14:43Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this episode features Ravid Circus, CPO of Seemplicity, https://seemplicity.io/, the Remediation Operations Leader transforming how security teams drive remediation and reduce noise in vulnerability and exposure management. Seemplicity acts as a Security Operations Accelerator, helping …
…
continue reading