Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Breach Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
After the Breach Podcast

Jeff Friedman and Sara Shimazu

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
  continue reading
 
Artwork

1
The Shipping Forecast

Hull Breach Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Grace, James and Nick are on a mission to find the best works of the fanfiction community. Join us bi-weekly as we explore a new fandoms, learn about the most popular fan couples ("Ships") and get lost down many rabbit holes along the way. Expect adult content and discussion of sexual topics throughout. Intro music by Matthew Dommett, more of his work can be found here: https://soundcloud.com/matthew-dommett
  continue reading
 
Artwork
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Breaching the Boardroom

NetGain Technologies, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Breaching the Boardroom is a high-level podcast designed to explore the intersection of leadership, growth, and technology. Each episode brings industry leaders, experts, and innovators together for candid conversations on how to navigate the evolving tech landscape while driving business success. We’re on a mission to simplify complex topics like AI, cyber threats, and IT strategy, making them accessible and actionable for executives in mid-market businesses.
  continue reading
 
Artwork

1
Zero Breach Zone

Andy Lombardo & Phil Hintz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
  continue reading
 
Every global crisis, every technological leap, and every headline-making attack is connected by a thread of code. Bytes, Borders, & Breaches is the show that gives you the cybersecurity lens—showing you the digital reality running beneath the surface of the news. We go beyond the fear, uncertainty, and doubt (FUD) to deliver clear, actionable, and highly engaging analysis. If you’ve ever watched The Matrix, The Bourne Series, or Game of Thrones and wondered how those scenarios play out in th ...
  continue reading
 
Artwork

1
Syntax

Twin Strangers Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A science fiction, horror audio drama podcast that follows Silas Caldwell, a linguist, who finds himself employed by VINCULA, a biotech company with an unearthly set of artifacts in their possession. Alongside a team of scientists and explorers, Silas plunges into the world beyond the Breach, and is touched by terrors beyond his wildest dreams. This show is a full cast audio drama, and has adult themes and horror settings. Made by Twin Strangers Productions. Hosted by Pinecast
  continue reading
 
Artwork

1
BIGcast

Best Innovation Group's John Best & 154 Advisors' Glen Sarvady

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The fintech industry is evolving rapidly, and the BIGcast is here to delve into its impact on the credit union industry. Our esteemed guests from across the financial, technology and security sectors will provide thrilling perspectives on the latest fintech innovations that are poised to revolutionize the way we handle our finances. Each week join thought-leader, John Best and subject matter expert, Glen Sarvady as they take a quick dive into the financial industry's current breakthroughs an ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
  continue reading
 
Artwork

1
Coffee, Chaos and ProdSec

Cameron Walters & Kurt Hendle

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
  continue reading
 
Artwork

1
Into The Breach!

Andrew Cooke

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿
  continue reading
 
Artwork

1
Cyber Law Revolution

Spencer Pollock

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Where cybersecurity leaders spill their guarded secrets. Hosted by AlterAim, The Breach Room dives deep with CEOs, founders, and power players in the cybersecurity world. From breakthrough wins to high-stakes roadblocks, each episode unpacks real stories, industry insights, and battle-tested strategies driving the future of cyber defense. If you’re scaling a cybersecurity company, or just want to hear how the best do it. This is your inside access.
  continue reading
 
Artwork

1
Breachside Broadcast

Wyrd Miniatures, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
  continue reading
 
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
  continue reading
 
Artwork

1
Hot Breach Podcast

by Get Flanked, Prodigio Pete & Rogue-9

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork
 
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Artwork

1
Tom McCartan's Breach Of Etiquette

Sauropod: Podcasting the 21st Century

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
  continue reading
 
Artwork

1
Breaching Extinction

Erica Wirth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
Artwork

1
Bad Breaches

Joi and Justin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
  continue reading
 
Artwork

1
PicklePod

Thomas Shields, Zane Navratil

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
On “PicklePod”, Thomas Shields and Zane Navratil deliver an entrée of updates from around the Pickleball World. Some would say it’s a “Picklers” dream podcast with the duo’s loud and unfiltered insights commentating on the good, the bad, and even the ugly sides of the sport as Pickleball undeniably rockets towards mainstream adoption. Weekly rotating topics, guests, tournament recaps, Pickleball pop-culture, player strategies, and more. No comment or topic can breach the PicklePod Non-Valley ...
  continue reading
 
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
  continue reading
 
Loading …
show series
 
They told us "Cyber War" was about data. They lied. It’s about kinetics. In Episode 03 of Bytes, Borders, & Breaches, we expose the terrifying shift from "Digital Espionage" to "Physical Sabotage." We break down how a single flaw in NVIDIA’s brain chip lets hackers drive robots into walls, how the new "CRINK" alliance has industrialized destruction…
  continue reading
 
Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
  continue reading
 
Returning guest Jared Towers from Bay Cetology joins us on this episode of After the Breach Podcast to discuss a paper he co-authored in the Journal of Comparative Psychology, "Testing the Waters: Attempts by Wild Killer Whales (Orcinus orca) to Provision People (Homo sapiens)." Before getting into the paper, we talk a bit about the recent release …
  continue reading
 
Send us a text We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for …
  continue reading
 
In this episode of Breaching the Boardroom, business leaders and experts share actionable insights on the evolving landscape of the workforce, the importance of elevating human potential through technology and strong company culture, the significance of building relationships, personal growth through education, and the value of networking in profes…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
  continue reading
 
Approximately 10,000 people are still under evacuation notice after multiple levee failures across Western Washington. In King County: flood controls have breached in the last 48 hours. As of this morning, residents in the city of Pacific, east of Tacoma, are under a "go now" evacuation order after a flood control breach on the nearby White River. …
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/ https://cybersecuritynews.com/mongobleed-poc-exploit-mongodb/ https://cybersecuritynews.com/fortigate-firewall-vulnerability/ …
  continue reading
 
Being a movie buff in Seattle feels a little… unsettled right now. That’s because there’s been a lot of changes at SIFF, the Seattle International Film Festival, which has been the vanguard when it comes to all things movies. The organization announced Monday, it was undergoing an organizational restructuring, including some layoffs. This follows a…
  continue reading
 
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with …
  continue reading
 
Happy New Year! 🎉✨ We’re kicking off 2026 with cybersecurity resolutions you’ll actually stick to — no cold plunges, no green juice cleanse, just a handful of tiny ten-minute wins that make a big difference to your privacy and security. We’ve turned the best advice from last season’s guests into a simple, practical checklist. On this episode, you’l…
  continue reading
 
Former cybercrime kingpin Brett Johnson didn’t just break the law; he built the tools still used by criminals today. He's back for another episode to check in and unpack why cybercrime works, how defenses fail, and the way life itself is often the ultimate "in" for an attacker. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security culture today. Sponsors Support for this show comes from ThreatLocker®. …
  continue reading
 
There are plenty of headwinds affecting affordable housing construction and maintenance right now. Building costs are going up, and federal funding is uncertain. Affordable housing providers in Seattle and beyond have struggled as COVID-era rent subsidies disappeared. Colleen Echohawk has been thinking about these issues a lot. She is the new CEO o…
  continue reading
 
Every Monday on Soundside we catch you up on the top stories that are fascinating right now – and what they say about the Pacific Northwest. It’s our chance to talk about the latest news with a rotation of plugged-in journalists and guests, taking a look at the headlines from the weekend and the stories that we'll be following as the week moves for…
  continue reading
 
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
  continue reading
 
In this episode of 'Cybersecurity Today', host David Shipley discusses significant cyber events and their implications. The podcast explores hints by President Donald Trump regarding the use of cyber tactics in a U.S. operation that resulted in a power outage in Venezuela. The episode also delves into the April 2025 data breach at Nova Scotia Power…
  continue reading
 
This week's Surveillance Report covers OpenAI's plan to prioritize sponsored content in ChatGPT answers, what to do if you're targeted by government spyware, Meta's secret playbook for avoiding scammer accountability, and more! This week's Surveillance Report covers: - OpenAI prioritizing new monetization models with obvious problems - How to see i…
  continue reading
 
Most cybercrime doesn’t start with genius hackers. It starts on a Tuesday. Someone’s busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn’t made people safer. It’s made them tired. Most cyber attacks don’t start with genius hackers. They start with rushed decisions, social engineering, …
  continue reading
 
Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
  continue reading
 
Across dozens of conversations centered on the CISO experience, one reality keeps surfacing: the role no longer exists to protect systems in isolation. It exists to protect the business itself. Today’s CISO operates at the intersection of operational risk, executive decision-making, and organizational trust. The responsibility is not just to identi…
  continue reading
 
In this episode, host Jim Love discusses the importance of cybersecurity awareness and training, featuring insights from Michael Joyce of the Human-Centric Cybersecurity Partnership at the University of Montreal and David Shipley of Beauceron Security. They explore the impact of cybersecurity awareness programs, the decay of sustained vigilance pos…
  continue reading
 
We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring truth that actually works: • Don’t g…
  continue reading
 
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
  continue reading
 
Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not. One theme rises above the rest: visibility remains the foundation of everythi…
  continue reading
 
Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving …
  continue reading
 
Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Question? Text our Studio direct. Growth without Interrupt…
  continue reading
 
It’s New Year’s Eve. At midnight, many of us will be raising glasses, kissing loved ones, and trying to remember the words to “Auld Lang Syne.” That song, if you don’t recall, begins with a question: “Should old acquaintance be forgot and never brought to mind?” We here at Soundside say, NO! We will remember. This year, we brought on a couple new p…
  continue reading
 
On this month's episode of Smells Like Identity Hygiene, we chat with SPHERE's own founder and CEO Rita Gurevich! Don't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHER…
  continue reading
 
🎙️ Coffee, Chaos and ProdSec, Ep 18 2026 is getting closer, and security is already acting weird. So this week, Kurt and Cameron grab their mugs and talk through what they see coming next for Product Security and the teams trying to keep up. From AI agents showing up in the SOC, AppSec, DevSecOps, and GRC, to supply chain risks getting deeper and h…
  continue reading
 
In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats…
  continue reading
 
This week, we’re revisiting some of our favorite segments of the year. And today, we're talking about transit. And translators. A now-former King County Metro Bus driver tells us what passengers should know when they ride the bus. But more importantly, we got some insight into why the 8 in downtown Seattle is so often called the late bus. Plus, we …
  continue reading
 
New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack strategy now directly targets customer…
  continue reading
 
Emennet Pasargad is one of the most active and aggressive Iranian cyber threat groups operating today — tied directly to the Islamic Revolutionary Guard Corps (IRGC) Cyber Electronic Command. In this episode of Cyber Resilience Brief, SafeBreach Senior Sales Engineer Adrian Culley breaks down who Emennet Pasargad really is, how they operate through…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play