The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
In less than 10 minutes, we'll get you up to speed on all the news you missed overnight. Throughout the morning, Marketplace's David Brancaccio will bring you the latest business and economic stories you need to know to start your day. And before U.S. markets open, you'll get a global markets update from the BBC World Service in London.
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Is the post-Cold War era over? In this brave new world, nothing is too small, or big, to be digitalised…including acts of war. Russian ransomware attacks almost doubled last year. At this very moment, cybercriminals are crippling schools, supermarkets, dentists, kindergartens, hospitals, oil pipelines - all in the name of money. Katie Puckrik wants to know who, and why. You can listen to the previous series of dot com on this same feed. Series 1 unveils the hidden army of volunteers behind t ...
…
continue reading
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Marketplace® is the leading business news program in the nation. We bring you clear explorations of how economic news affects you, through stories, conversations, newsworthy numbers and more. The Marketplace All-in-One podcast provides each episode of the public radio broadcast programs Marketplace, Marketplace Morning Report®and Marketplace Tech® along with our podcasts Make Me Smart, Corner Office and The Uncertain Hour. Visit marketplace.org for more. From American Public Media.
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
A vibrant blend of top news stories, local weather, traffic reports, comedy, local music, and interviews about politics, science and culture. Tune into Mainstreet on weekdays from 3 to 6 p.m. Add your voice by calling us at 1-888-686-MAIN (6246) or e-mail [email protected].
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
"Cyberside Chat" is your go-to source for daily cybersecurity news, providing listeners with a comprehensive rundown of the latest threats, vulnerabilities, and attacks in the digital world. Hosted by expert cybersecurity professionals, each episode of "Cyberside Chat" offers a concise and informative overview of the day's top headlines, covering everything from malware and ransomware attacks to data breaches and cyber espionage. Our team of experienced analysts and researchers keeps a close ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading

1
Nova Scotia Power president and CEO gives details about the "sophisticated ransomware attack"
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Peter Gregg tells Jeff Douglas about the ransomware attack Nova Scotia Power has been the victim of. He confirmed that the hackers who stole the data have published it to the dark web.
…
continue reading

1
Kettering Health Ransomware Attack, Russia Targets Ukrainian Supply-Chain, Lumma Stealer Disrupted, China Targets Laid Off Worker, Cisco & GitLab Patch
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00🎙️ Kettering Health Ransomware Attack, Russia Targets Ukrainian Supply-Chain, Lumma Stealer Disrupted 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 915: Today’s episode will discuss the latest news as Kettering Health Ransomware Attack more news below: · China Targets Laid Off Wor…
…
continue reading

1
When a grocery store chain gets hit with a ransomware attack
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39From the BBC World Service: Some U.K. retailers are dealing with a curious cyberattack. One of them is Marks and Spencer, also known as M&S. The attack has resulted in empty shelves, an inability to take online orders and roughly $400 million in lost earnings. Plus, if you're into moisturizers, you've probably encountered shea butter. But the nut t…
…
continue reading

1
Ep. 94 Diving into the Coinbase Ransomware Attack
3:27
3:27
Play later
Play later
Lists
Like
Liked
3:27Send us a text Ep. 94 of the Cyber Law Revolution is live! In this episode, we discuss the recent Coinbase ransomware attack, the likely cause of the attack, the reputational impact, and how cryptocurrency is the Wild West. You won’t want to miss it! Keep the calls, questions, comments, etc. coming – 410-917-5189 or [email protected]…
…
continue reading

1
Cybersecurity Updates: Major Ransomware Attacks Thwarted and Illegal Marketplaces Shut Down
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13In this episode, Jim Love discusses significant cybersecurity events including Coinbase's refusal to pay a $20 million ransom after a data breach, Broadcom's patch for VMware tools vulnerabilities, and Telegram's shutdown of two illegal marketplaces handling $35 billion in transactions. The episode also covers the Co-op’s preemptive measures to thw…
…
continue reading

1
WNBA franchises are a slam dunk in this iffy economy
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36The WNBA’s first expansion team in 18 years, the Golden State Valkyries, played its first game last week to a crowd of 18,000 fans. Though this uncertain economy may not be ideal for most new businesses, professional women’s basketball is soaring to new heights: three brand-new teams joined the league this season. In this episode, why WNBA franchis…
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
…
continue reading

1
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
…
continue reading

1
Who should pay for programs like Medicaid or food stamps?
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Should it be the federal government or the states? The GOP tax bill, now headed to the Senate, would have states pick up more of the tab — meaning states would likely have to raise taxes or cut spending. We'll hear more. But first: Tariff drama is back. Then, after the murder of George Floyd, corporate America pledged billions of dollars to help fi…
…
continue reading

1
Who should pay for programs like Medicaid or food stamps?
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Should it be the federal government or the states? The GOP tax bill, now headed to the Senate, would have states pick up more of the tab — meaning states would likely have to raise taxes or cut spending. We'll hear more. But first: Tariff drama is back. Then, after the murder of George Floyd, corporate America pledged billions of dollars to help fi…
…
continue reading

1
From TikTok to Total Compromise: The Rise of Social Media Infostealers
18:50
18:50
Play later
Play later
Lists
Like
Liked
18:50In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
…
continue reading
Sales of existing homes fell in April to about 4 million a year. For comparison, almost 7 million existing homes were sold each year from 2020 to 2022. The reasons? Home prices are high, mortgage rates are high, and there's lots of economic uncertainty. And later in the program: A proposed law could help people who lost homes in this year's Los Ang…
…
continue reading
Sales of existing homes fell in April to about 4 million a year. For comparison, almost 7 million existing homes were sold each year from 2020 to 2022. The reasons? Home prices are high, mortgage rates are high, and there's lots of economic uncertainty. And later in the program: A proposed law could help people who lost homes in this year's Los Ang…
…
continue reading

1
A problem Japan is facing after decades? Inflation
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43From the BBC World Service: Japan's inflation rate is heating up, hitting its fastest pace in more than two years: 3.5% in April. That could mean higher interest rates for the first time in years. It's a big shift for a country used to falling prices and a major challenge for the government and central bank. Plus: flooding in Australia, a raised re…
…
continue reading

1
A problem Japan is facing after decades? Inflation
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43From the BBC World Service: Japan's inflation rate is heating up, hitting its fastest pace in more than two years: 3.5% in April. That could mean higher interest rates for the first time in years. It's a big shift for a country used to falling prices and a major challenge for the government and central bank. Plus: flooding in Australia, a raised re…
…
continue reading

1
Bytes: Week in Review – AI dominates Google I/O and more
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38On this week’s episode of Marketplace Tech Bytes: Week In Review, President Donald Trump signed the "Take It Down" Act, which requires internet publishers to take down intimate images like revenge porn or deepfakes within 48 hours of a complaint. Google unveiled a suite of new AI products, upgrades and projects at its annual I/O developers conferen…
…
continue reading

1
Mic Drop: Blockchain buzzkill — one miner’s lament.
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37When Richard Hunter heard about Kentucky’s generous crypto incentives, he packed up his Bitcoin machines and pointed them south. He imagined a booming business, jobs for locals, and maybe—just maybe—a shot at redemption. But what he got… was a buzzkill. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Cybersecurity Threats and Breaches: Critical Updates and Insights
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24In this episode of Cybersecurity today, host Jim Love reports on various critical cyber threats and data breaches. A newly discovered flaw in Windows Server 2025 allows attackers to seize full domain control, referred to by researchers as the 'bad successor' exploit. Government messaging app Telem Message, a customized version of Signal, was hacked…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn’t frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing…
…
continue reading
The supply of homes for sale hit a nearly five-year high in April, but prospective buyers aren’t exactly taking the bait. Some may feel they’re swimming in options, but many can’t afford what’s available. In this episode, why the spring housing market is feeling unbalanced. Plus, online restaurant reservation platforms duke it out with the help of …
…
continue reading

1
When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | An Infosecurity Europe 2025 Pre-Event Conversation with Peter Garraghan | On Location Coverage with Sean Martin and Marco Ciappelli ...
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45In this episode of our InfoSecurity Europe 2024 On Location coverage, Marco Ciappelli and Sean Martin sit down with Professor Peter Garraghan, Chair in Computer Science at Lancaster University and co-founder of the AI security startup Mindgard. Peter shares a grounded view of the current AI moment—one where attention-grabbing capabilities often dis…
…
continue reading

1
Celebrating 30 Years of Connection, Innovation, and Community at Infosecurity Europe in London | Our Traditional Pre-Event Kick-Off Conversation with Saima Poorghobad | On Location Coverage with Sean Martin ...
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much m…
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading

1
Kettering Health Breached: What the Interlock Ransomware Group Did and Why It Matters
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlock ransomware group behind it. Interlock, active since late 2024, has adopted advanced techniques including double extortion, credential theft, and PowerShell-based backdoors to compromise healthcare …
…
continue reading

1
Higher education is a major U.S. export. And it’s under threat.
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46It’s Kai’s last day as a regular co-host of “Make Me Smart” and he’s got a solid rant (and two bleeps). We’ll get into the Trump administration’s push to block international students at Harvard, thretening one of American’s biggest exports: higher education. Plus, we’ll unpack the Supreme Court’s 4-4 split over a separation of church and state case…
…
continue reading
When newlyweds Chantal and Travis Lisback started searching for their dream home in Seattle, they weren’t entirely on the same page. Chantal was eager to settle down as soon as possible, while Travis was more comfortable waiting a few years. As the search dragged on, what began as a shared dream started to feel more like a standoff. This week, a st…
…
continue reading

1
Olivia Rose on why the CISO role may not be the pinnacle of security work
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48In this episode, Greg sits down with Olivia Rose, Founder and CISO of the Rose CISO Group, to talk about her role in "CISO: The Worst Job I Ever Wanted," a groundbreaking cybersecurity docuseries that reveals the real experiences of Chief Information Security Officers. This podcast uncovers the pressures, sleepless nights, and personal sacrifices t…
…
continue reading

1
Deepfake Threats, Mobile Biometrics, and the Future of Trust
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01As digital deception evolves, so must our defenses. In this episode, we dive deep into the escalating battle for trust in our increasingly connected world. From nation-state-level authentication models to real-time behavioral biometrics on your mobile device, the tools to verify identity are becoming more sophisticated—and more essential—than ever.…
…
continue reading