Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Series devoted to the education and general discussion around the Fortinet technology fabric.
…
continue reading
A K12TechPro Podcast. This podcast is about trending K12 technology topics and issues. Josh, Chris, and Mark have real conversations, real arguments, and real banter on IT issues and trends in K12 Schools. Current and Past Sponsors: Absolute, HPE Aruba Networking, Blocksi, ClassLink, CTL, Eaton, Extreme Networks, Fortinet, Howard Technology Solutions, iDoc, Infoblox, INVZBL, Jupiter Education, K12TechPro, Luma Technologies, Managed Methods, MidwestTechTalk, NTP, Papercut, Provision Data Solu ...
…
continue reading
The podcast about Fortinet technology. Episodes can be found at forticast.fortinet.com.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
Take a listen to the #LighthouseITPodcast every other week as we discuss both cybersecurity and digital marketing news! It's time to stop dreaming IT. Let's start doing IT. #GetLITS
…
continue reading
Joe House and Nathan Hubbard break down the latest headlines in the world of golf, with special guests, coverage of the major championships, and all the drama in the sport. Welcome to Fairway Rollin'!
…
continue reading
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Interviewing partner experts, I get to ask the questions and get personal insights into the topics we all talk about; game-changing technologies that construct this complex matrix of information that we frequently use as we live, work and play.
…
continue reading
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection (#)
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon…
…
continue reading

1
5 Microsoft 0days Patched, Fortinet Zeroday, WeChat Money Laundering, Alabama Cyberattack, Ukraine Cyber Spying
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19🎙️ 5 Microsoft 0days Patched, Fortinet Zeroday, WeChat Money Laundering, Alabama Cyberattack, Ukraine Cyber Spying 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 910: Today’s episode will discuss the latest news as 5 Microsoft 0days Patched more news below: · SAP Patches Another Ne…
…
continue reading

1
Mark's and Spencer Data Breach, Vulnerable Routers, Fortinet Exploits, and New Ransomware Threats
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38In this episode of Cybersecurity Today, host Jim Love covers recent cybersecurity incidents including a data breach at Mark's and Spencer, the FBI's alert on outdated routers being exploited, and critical Fortinet vulnerabilities actively used in attacks. Additionally, the episode discusses a researcher’s proof of concept showing how ransomware can…
…
continue reading

1
Fortinet ON AIR #5 - Navigating AI, Misinformation & Cyber Resilience with Orange Cyberdefense
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading

1
Pig Butchering: Operation Shamrock Fights Back
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05In this episode, the host delves into the alarming rise of 'pig butchering' scams, a form of fraud that preys on vulnerable and trusting individuals, often leaving them financially and emotionally devastated. These scams are orchestrated by organized crime syndicates that use brutal methods, including violence and human trafficking, to sustain thei…
…
continue reading

1
HN783: BGP Routing Policy for Enterprise Networkers: Unpacking IRR and RPSL
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30If you participate in the public Internet by announcing your own netblocks, you should be familiar with Internet Routing Registries (IRRs) and the Routing Policy Specification Language (RPSL). These are tools that help you be a good network citizen. In a world of BGP hijacks and other problems, these tools matter more than ever. We... Read more »…
…
continue reading

1
Holy Cards, Cheating Grads, Coinbase Bribery, Buying 23andMe & IT Cuts
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29The Lighthouse IT Podcast - May 30th, 2025 This week, Matt and Griff talk about how HBO is renaming itself again, the Pope's trading card craze, Collage students using AI to "cheat", Apple and BYOD, Coinbase's breach due to bribery, Regeneron buying 23andMe, why your IT budget might be dangerously low, and much more! https://hub.lighthousesol.com/b…
…
continue reading

1
Cybersecurity Today: Hijacker Scams, Ransomware Attacks, and Summer Travel Threats
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33In this episode of Cybersecurity Today, host Jim Love covers critical updates in the world of cyber threats. The FBI warns of hijackers posing as IT support to infiltrate law firms, a Wisconsin city reveals a ransomware attack affecting 67,000 residents, and a Texas city refuses to pay a ransom, risking the public release of sensitive data. The epi…
…
continue reading

1
Episode 216 - How do you handle a curious or mischievous tech student?
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40Tune in for an engaging chat about the latest educational AI updates from Microsoft, which include new tools and changes, such as Microsoft co-pilot chat features for students aged 13 and up. The discussion also touches on the dynamics of summer school technology mishaps. The hosts also discuss how to handle students' tech misadventures, exploring …
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2; (#)
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2; Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adve…
…
continue reading

1
Victoria’s Secret Cyberattack, Lexis Nexis Risk Solutions Breach, Google Calendar Abuse, OneDrive Full Access
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17🎙️ Victoria’s Secret Cyberattack, Lexis Nexis Risk Solutions Breach, Google Calendar Abuse, OneDrive Full Access 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 919: Today’s episode will discuss the latest news as Victoria’s Secret Cyberattack more news below: · Oregon Passes GeoLoc…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a “weird string” found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5B…
…
continue reading

1
The Revelation of Ben Griffin, Tour Championship Changes, and Memorial Tournament Preview!
51:46
51:46
Play later
Play later
Lists
Like
Liked
51:46House and Hubbard tee off with their recap of the Charles Schwab Challenge, including Ben Griffin’s win (00:52), Then, they hit on Ryder Cup team positioning (05:40), potential driver testing (10:54), and Tour Championship changes (18:06). Finally, they preview and offer their favorite plays for the Memorial Tournament (26:55). The Ringer is commit…
…
continue reading

1
MathWorks Ransomware, Czech Republic Blames China for Cyber Espionage, Iranian Pleads Guilty to Baltimore Ransomware
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05🎙️ MathWorks Ransomware, Czech Republic Blames China for Cyber Espionage, Iranian Pleads Guilty to Baltimore Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 918: Today’s episode will discuss the latest news as MathWorks Ransomware more news below: · Sheboygan WI Cyber att…
…
continue reading

1
Phishing Scams, DNS Hijacking, and Cybersecurity Leadership Shakeup
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode of Cybersecurity Today, host Jim Love explores the intricacies behind phishing emails that cleverly spoof Microsoft addresses, making many fall for scams despite appearing legitimate. Love emphasizes the need for a stringent 'zero trust' approach to counter these advanced tactics. Additionally, the episode delves into the activities…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and sho…
…
continue reading

1
Silent Ransomware Targets Law Firm, Adidas Warns of Breach, Russian Cyber Activities Target Dutch Police
17:26
17:26
Play later
Play later
Lists
Like
Liked
17:26🎙️ Silent Ransomware Targets Law Firm, Adidas Warns of Breach, Russian Cyber Activities Target Dutch Police 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 917: Today’s episode will discuss the latest news as Silent Ransomware Targets Law Firm more news below: · Nova Scotia Couple L…
…
continue reading

1
Nova Scotia Power Ransomware, $223 Million Crypto Heist, Cityworks Zeroday Exploited by China, SEC Disclosure Challenged
19:42
19:42
Play later
Play later
Lists
Like
Liked
19:42🎙️ Nova Scotia Power Ransomware, $223 Million Crypto Heist, Cityworks Zeroday Exploited by China, SEC Disclosure Challenged 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 916: Today’s episode will discuss the latest news as Nova Scotia Power Ransomware more news below: · 270 Tied t…
…
continue reading

1
Unraveling Cyber Threats: Ransomware, Kidnapping, and Record-Breaking DDoS Attacks
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47In this episode of Cybersecurity Today, host David Shipley dives into several alarming cyber incidents. The show starts with Nova Scotia Power's confirmation of a ransomware attack that forced the shutdown of customer-facing systems and led to data being published on the dark web. The company decided not to pay the ransom, adhering to law enforceme…
…
continue reading

1
From English Literature to Cybersecurity: A Journey Through Blockchain and Security
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36LINKS: https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability: https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja from Distrust. Anton shares his unique career transition f…
…
continue reading

1
HN782: Netris Meets Your Network Automation Challenges in AI Data Centers (Sponsored)
58:33
58:33
Play later
Play later
Lists
Like
Liked
58:33Netris is tackling the issue of automating multi-tenancy in an AI data center. Netris has your answer to this challenge, and it’s a solution certified to work with NVIDIA. We’re going to get into the nuts and bolts of Netris network automation with Alex Saroyan, CEO and co-founder of Netris. Along the way, we will... Read more »…
…
continue reading

1
Cybersecurity Threats and Breaches: Critical Updates and Insights
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24In this episode of Cybersecurity today, host Jim Love reports on various critical cyber threats and data breaches. A newly discovered flaw in Windows Server 2025 allows attackers to seize full domain control, referred to by researchers as the 'bad successor' exploit. Government messaging app Telem Message, a customized version of Signal, was hacked…
…
continue reading

1
Episode 215 - PowerSchool Hacker Has Been Caught!
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Josh and Mark dive into the arrest of the notorious PowerSchool hacker, revealing the unexpected identity of the mastermind behind one of the year's biggest cyber breaches. Join them as they speak with cybersecurity expert Michael Klein, who provides insights into the hacker's profile and discusses the implications for school districts and policyma…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading