Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Your daily cybersecurity news for cyber professionals.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
Comedian Cody Johnston hosts this always fair, always well-researched, but most importantly, always entertaining take on the topical news of the week. Every Tuesday, Some More News dives into the world's weekly events with a mix of wit, dread, hope and compassion. Since the news cycle never stops spinning, Johnston returns every Friday for Even More News, co-hosted by Katy Stoll. Together, they present an informative and comedic spin on the viewers’ frustrations with the news that week.
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Join CovertSwarm and special guests, as they discuss the latest Cyber Security news, trends, 0-day exploits and research. www.covertswarm.com
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
A BDSM Cyberpunk Audio Drama
…
continue reading
Daily update on current cyber security threats
…
continue reading
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes Support this podcast: https://podcasters.spotify.com/pod/show/richard-campbell/support
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The Cyber Social Hub is an online community of digital investigators. Join your host, Kevin DeLong as he discusses with a variety of guests on topics in the field of digital investigations and sometimes terrible ”dad” jokes. We talk to investigators, researchers, and vendors to get you the information you need to find the truth about digital incidents! Join us at https://cybersocialhub.com for FREE and be part of the community. If you want to see the video version of this podcast, watch us o ...
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
What do assassinations, cyber hacks and disinformation have in common? They’re all weapons used by states against each other in a grey zone of harm that sits - deliberately - under the threshold of war, but could be just as dangerous if ignored. Sky News Foreign Affairs Editor Deborah Haynes explores this often invisible battlefield, where anything can be - and is - used as a weapon and anyone, anywhere can be a target.
…
continue reading
This is the official WAR MODE podcast please enjoy Patreon- https://www.patreon.com/WARMODE
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
”Digital Defenders” is a must-listen podcast for anyone interested in staying ahead in the ever-evolving field of cybersecurity. Hosted by industry veterans, each episode delves into the latest threats, emerging technologies, and cybersecurity strategies. From interviews with leading experts to deep dives into case studies of significant security breaches, this podcast provides a comprehensive overview of the landscape. Whether you’re a professional in the field, a business owner concerned a ...
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
…
continue reading
LifeWave is a company that sells a line of patches designed to improve a variety of health conditions. The patches, such as X39, are advertised as using phototherapy, a science involving the use of light to promote healing, to stimulate the body's natural energy flow and improve overall well-being. The company offers patches targeting different asp…
…
continue reading

1
🔴 Oct 28s Top Cyber News NOW! - Ep 738
1:28:54
1:28:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:28:54
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. 💥 Get the GRC Analyst Master Class, packed with practical skills and no prerequisites from Simply Cyber Academy. Check out Barricade Cyber Solutions for Rapid Incident Response and Business Recovery Services from BEC and Ransomware atta…
…
continue reading
In today’s podcast we cover four crucial cyber and technology topics, including: 1. OnePoint Patient Care victim of INC Ransomware Group 2. Researchers find ransomware group using TEAMS in new attacks 3. Ireland fines LinkedIn 310 million Euros 4. Russia sentences 2 cyber criminals to 4.5, 5 years in prison I'd love feedback, feel free to send your…
…
continue reading

1
Between Two Nerds: Measuring cyber power
31:43
31:43
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:43
In this edition of Between Two Nerds Tom Uren and The Grugq talk about a new attempt to measure cyber power, the International Institute for Strategic Studies Cyber Power Matrix. Show notes Project Raven The Council on Foreign Relations Cyber Operations Tracker The IISS Cyber Power Matrix
…
continue reading

1
Understanding Cyber Threats in Elections and Infrastructure with Maggie Miller
52:21
52:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
52:21
From the notorious Ticketmaster hack during Taylor Swift's ticket sales to the geopolitical cyber issues involving heavyweights like China and Israel, Maggie provides a comprehensive overview of the current cyber landscape. We'll explore the bipartisan effort needed to safeguard US infrastructure, including the vulnerabilities of our satellite syst…
…
continue reading
Global law enforcement gains access to RedLine and Meta infostealer networks Russian-backed malware poses as Ukrainian anti-recruitment tool Massive breach impacts French telecom giant Thanks to today's episode sponsor, Dropzone AI Imagine an AI analyst that never sleeps. Dropzone AI autonomously handles every alert, cutting manual analysis by 90%.…
…
continue reading
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading

1
178. Saving Odie: A team of space geeks, a scrappy lunar lander and today’s hackable space race
26:29
26:29
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:29
NASA has off-loaded much of the space program onto the private sector. Companies are building space suits and moon buggies and lunar landers. We tell the story of a scrappy little lander — and how earthlings had to hack it to save it.Recorded Future News által
…
continue reading

1
Embracing the Suck, Lessons From #NASA In #Cybersecurity
53:59
53:59
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
53:59
Send us a text In this engaging conversation, Robert Vescio shares his unique journey from horticulture to cybersecurity, emphasizing the importance of economics in understanding cyber risk. The discussion highlights the value of learning from mistakes, the need for transparency in cyber risk management, and the cultural challenges within the cyber…
…
continue reading
Our Q3 2024 APT Quarterly Highlights Report reveals intensified cyber activities from APT groups in Iran, Russia, China, and North Korea, indicating heightened espionage efforts. Iran’s MuddyWater and APT34 leveraged custom malware like BugSleep, while Russia’s APT29 and APT28 capitalized on zero-day vulnerabilities for sophisticated infiltration. …
…
continue reading

1
DtSR Episode 625 - Cyber Ghost Stories to Tell in the Dark
39:27
39:27
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:27
Send the hosts a message - try it now! TL;DR: On this week's episode, Jim, James, and I sit down to a Halloween "scary story" episode. You know the feeling... that sinking feeling of dread when you can't quite put your finger on what's wrong but something is definitely wrong. Something scary, and nefarious is happening... and usually it's coming fr…
…
continue reading
Apple Update Everything https://isc.sans.edu/diary/Apple%20Updates%20Everything/31390 Selfcontained HTML Phishing Attachment Using Telegram to Exfiltrate Credentials https://isc.sans.edu/diary/Selfcontained+HTML+phishing+attachment+using+Telegram+to+exfiltrate+stolen+credentials/31388/ ChatGPT-4o Guardrail Jailbreak: Hex Encoding for Writing CVE Ex…
…
continue reading

1
CyberSunday Episode 12 by Ai Win October 27 2024
54:00
54:00
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
54:00
wnguyen által
…
continue reading
Apple Updates; HTML File Phishing via Telegram; ChatGTP-4o Encoding Evasion Apple Update Everything https://isc.sans.edu/diary/Apple%20Updates%20Everything/31390 Selfcontained HTML Phishing Attachment Using Telegram to Exfiltrate Credentials https://isc.sans.edu/diary/Selfcontained+HTML+phishing+attachment+using+Telegram+to+exfiltrate+stolen+creden…
…
continue reading

1
Operation Magnus strikes back.
33:41
33:41
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:41
Operation Magnus disrupts notorious infostealers. Pennsylvania officials debunk election disinformation attributed to Russia. TeamTNT targets Docker daemons. Delta sues CrowdStrike. NVIDIA released a critical GPU Display Driver update. Fog and Akira ransomware exploit SonicWall VPNs. A researcher demonstrates Downgrade attacks against Windows syste…
…
continue reading

1
Is AppSec Dead? Exploring ASPM.
35:05
35:05
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:05
Welcome to another episode of The Dirty South Cybersecurity Podcast! 🎙️ In this episode, your hosts Tony and Q0PHI dive deep into the world of Application Security (AppSec). They tackle the burning question: Is AppSec dead? 🤔 Join the discussion as they explore the rise of Application Security Posture Management (ASPM) and debate whether ASPM is th…
…
continue reading

1
Black Hat 2024 - 5 Key Topics
31:21
31:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:21
Join Tony UV and Q0PHI80 at Black Hat 2024 as they discuss these 5 key topics: 1) Crowdstrike Incident - Security Issue, Incident or Neither? 2) QA Testing Today - For Better or for Worse? 3)Geopolitics in the Role of Cybercrime- Forgotten X-Factor or Integrated Background Influence? 4)Automated Pen Testing- Fact or Fiction for the Future? 5) Role …
…
continue reading

1
CCT 188: Applying Various Resource Protections for the CISSP Exam (Domain 7.5)
27:57
27:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:57
Send us a text Ready to elevate your cybersecurity acumen and conquer the CISSP exam? Tune in to our latest episode, where we unravel the intricacies of a significant ransomware attack that exploited a supply chain vulnerability, impacting 60 US credit unions via the Citrix bleed vulnerability. This real-world scenario stresses the necessity of sec…
…
continue reading
Change Healthcare data breach confirmed as largest-ever in U.S. healthcare history Authorities investigate telecom hacks following reports of campaign intrusions Delta sues CrowdStrike over sensor update that prompted mass flight disruptions Thanks to today's episode sponsor, Dropzone AI Is your SOC overwhelmed by endless alerts? Dropzone AI’s auto…
…
continue reading

1
How to turn tech insights into real advantages. [CSO Perspectives]
11:08
11:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:08
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting duties to Dr. Rebecca Wynn, the Click Solutions Group Global Chief Security Strategist & CISO. She interviews Justin Daniels, a Baker Donelson lawyer and podcast host with expertise in cyber operations, M&A, and investment capital transactions, on the current state of …
…
continue reading
Two currently (old) exploited Ivanti vulnerabilities https://isc.sans.edu/diary/Two%20currently%20%28old%29%20exploited%20Ivanti%20vulnerabilities/31384 Arcadyan FMIMG51AX000J (WiFi Alliance) RCE CVE-2024-41992 https://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce/ Okta iOS App Vulnerability CVE-2024-10327 https://trust.o…
…
continue reading

1
Top Privacy & Security Tools must have
11:47
11:47
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:47
Your list already outlines some of the best practices for enhancing online privacy and security. To build on these, consider these additional strategieswnguyen által
…
continue reading

1
Powerful Online Protection for Your Digital Life
31:07
31:07
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:07
This excerpt is an advertisement for Guardio, an online security service that aims to protect users from cyber threats. Guardio emphasizes its user-friendly approach to online security by providing powerful features like browsing and email protection, coupled with dedicated 24/7 support. The advertisement highlights the increasing prevalence of cyb…
…
continue reading
Old Ivanti Vulns Exploited; Arcadyan Wifi RCE; Okta iOS Vuln; TeamTNT Docker Hunt Two currently (old) exploited Ivanti vulnerabilities https://isc.sans.edu/diary/Two%20currently%20%28old%29%20exploited%20Ivanti%20vulnerabilities/31384 Arcadyan FMIMG51AX000J (WiFi Alliance) RCE CVE-2024-41992 https://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51a…
…
continue reading

1
Risky Biz News: Russia sends REvil gang members to prison
10:29
10:29
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
10:29
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: Russia sentences REvil members to prison. Yes! Really!
…
continue reading

1
Episode 83: Episode 83 - Security Q & A - Part 1
18:40
18:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
18:40
In this episode, Richard starts to answer many common security questions. More questions to come in future episodes.
…
continue reading

1
Mission possible? Navigating tech adoption in the DoD. [Special Edition]
34:12
34:12
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:12
In this episode, N2K's Brandon Karpf interviews Pete Newell, CEO and Founder of BMNT, about the challenges facing technology adoption within the Department of Defense (DoD). They discuss the concept of “mission acceleration,” focusing on the DoD’s struggle to keep pace with rapid changes on the battlefield and the importance of a human-centered app…
…
continue reading
Enjoy this special encore episode where we are joined by Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton, as he takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the s…
…
continue reading

1
LLM security 101. [Research Saturday]
20:53
20:53
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
20:53
This week, we are pleased to be joined by Mick Baccio, global security advisor for Splunk SURGe, sharing their research on "LLM Security: Splunk & OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems …
…
continue reading

1
Week in Review: Solar Winds fines, Microsoft loses security logs, employee security awareness lacking
29:19
29:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:19
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dmitriy Sokolovskiy, senior vice president, information security, Semrush Thanks to our show sponsor, SpyCloud SpyCloud disrupts cybercrime by telling you what criminals know about your business, so you can take action on exposed iden…
…
continue reading

1
UnitedHealth breach numbers confirmed.
26:42
26:42
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:42
UnitedHealth confirms breach numbers. Patient privacy pains. Amazon vs. APT29. CDK vulnerability threatens user security. Fog and Akira take aim at SonicWall. Level up or log off. LinkedIn in hot water. Open source, closed doors. Watt's the risk? Today, we are joined by Itzik Alvas, Entro Security’s CEO and Co-Founder, discussing their research tea…
…
continue reading

1
Why We Must Measure Cyber Risk. CEO Interview.
1:00:20
1:00:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:00:20
David Mauro and Ryan Leirvik (CEO of Neuvik) discuss why we must measure cyber risk, effective ways to protect business from cybercrime and how business measures cyber risk. The discussion also highlights why businesses need incident response plan today and the impact of social engineering. Send us a text Get peace of mind. Get Competitive-Get NetG…
…
continue reading

1
🔴 Oct 25s Top Cyber News NOW! - Ep 737
1:58:40
1:58:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:58:40
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
The "SharkJack" is a portable hacking device that can be used to test network security. It is described as being powerful and fast, with features that allow users to quickly scan networks, assess device activity, and potentially gain access to sensitive information. The device is also equipped with a USB-C charging port and an RGB LED that provides…
…
continue reading

1
Credit Freezes vs. Fraud Alerts
16:19
16:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
16:19
The Experian article compares fraud alerts and credit freezes, explaining their differences and purposes. Fraud alerts notify creditors to verify a person's identity before extending credit, while credit freezes restrict access to a person's credit report altogether, preventing the opening of new accounts. The article also advises on when to use ea…
…
continue reading

1
The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing
15:26
15:26
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
15:26
The Talos IR Quarterly Trends Q3 2024 is out now! In this episode Hazel Burton, Craig Jackson and Bill Largent discuss three big themes: some new ransomware players, the 'Bring Your Own Vulnerable Driver' trend, and why password spray attacks are making a comeback. Check out the full report at https://blog.talosintelligence.com/incident-response-tr…
…
continue reading
Researchers reveal upgraded Qilin ransomware-as-a-service CISA adds Microsoft SharePoint flaw to its KEV catalog Rhysida ransoms Easterseals Thanks to today's episode sponsor, SpyCloud Ransomware continues to impact organizations. A new report released by SpyCloud shares insights from your peers in security – the majority of whom were affected by r…
…
continue reading

1
177. Mic Drop: NSA’s David Luber on Russia, China and the power of partnerships
14:46
14:46
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
14:46
We talk to the NSA’s Director of Cybersecurity, David Luber, about Ukraine, adversaries in cyberspace, and the importance of partnerships.Recorded Future News által
…
continue reading

1
Even More News: Trump Likes Hitler, Elon Hates Election Laws, and Tim Pool's Beanie Babies
59:06
59:06
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
59:06
Hi. Kat Abughazaleh joins Katy and Cody to discuss Kamala Harris' last-minute opportunity to court voters angry about genocide, Donald Trump's unsurprising praise of Hitler, Elon Musk's attempt at subverting federal election laws, Blade Runner 2049, and Tim Pool's big little announcement.Right now, Whisker is offering $75 off Litter-Robot bundles. …
…
continue reading