Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Breach Podcasts
A bi-weekly podcast from The Breach featuring sharp commentary on politics and movements in Canada.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Grace, James and Nick are on a mission to find the best works of the fanfiction community. Join us bi-weekly as we explore a new fandoms, learn about the most popular fan couples ("Ships") and get lost down many rabbit holes along the way. Expect adult content and discussion of sexual topics throughout. Intro music by Matthew Dommett, more of his work can be found here: https://soundcloud.com/matthew-dommett
…
continue reading
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
…
continue reading
Breaching the Boardroom is a high-level podcast designed to explore the intersection of leadership, growth, and technology. Each episode brings industry leaders, experts, and innovators together for candid conversations on how to navigate the evolving tech landscape while driving business success. We’re on a mission to simplify complex topics like AI, cyber threats, and IT strategy, making them accessible and actionable for executives in mid-market businesses.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Every global crisis, every technological leap, and every headline-making attack is connected by a thread of code. Bytes, Borders, & Breaches is the show that gives you the cybersecurity lens—showing you the digital reality running beneath the surface of the news. We go beyond the fear, uncertainty, and doubt (FUD) to deliver clear, actionable, and highly engaging analysis. If you’ve ever watched The Matrix, The Bourne Series, or Game of Thrones and wondered how those scenarios play out in th ...
…
continue reading
A science fiction, horror audio drama podcast that follows Silas Caldwell, a linguist, who finds himself employed by VINCULA, a biotech company with an unearthly set of artifacts in their possession. Alongside a team of scientists and explorers, Silas plunges into the world beyond the Breach, and is touched by terrors beyond his wildest dreams. This show is a full cast audio drama, and has adult themes and horror settings. Made by Twin Strangers Productions. Hosted by Pinecast
…
continue reading
SC Media and Saviynt are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The fintech industry is evolving rapidly, and the BIGcast is here to delve into its impact on the credit union industry. Our esteemed guests from across the financial, technology and security sectors will provide thrilling perspectives on the latest fintech innovations that are poised to revolutionize the way we handle our finances. Each week join thought-leader, John Best and subject matter expert, Glen Sarvady as they take a quick dive into the financial industry's current breakthroughs an ...
…
continue reading
Pop culture talk, among other things
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Step into The Breach as we expose and explore abuses of power in our government. Part of the Rewire News Group podcast network.
…
continue reading
Small time guy, with small time opinions on Magic the Gathering
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
…
continue reading
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
…
continue reading
Where cybersecurity leaders spill their guarded secrets. Hosted by AlterAim, The Breach Room dives deep with CEOs, founders, and power players in the cybersecurity world. From breakthrough wins to high-stakes roadblocks, each episode unpacks real stories, industry insights, and battle-tested strategies driving the future of cyber defense. If you’re scaling a cybersecurity company, or just want to hear how the best do it. This is your inside access.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
…
continue reading
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
…
continue reading
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
…
continue reading
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
…
continue reading
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
…
continue reading
About boys who wanted to start a club to stick up for what’s for
…
continue reading
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
…
continue reading
Tech news from a uniquely Catholic perspective
…
continue reading
On “PicklePod”, Thomas Shields and Zane Navratil deliver an entrée of updates from around the Pickleball World. Some would say it’s a “Picklers” dream podcast with the duo’s loud and unfiltered insights commentating on the good, the bad, and even the ugly sides of the sport as Pickleball undeniably rockets towards mainstream adoption. Weekly rotating topics, guests, tournament recaps, Pickleball pop-culture, player strategies, and more. No comment or topic can breach the PicklePod Non-Valley ...
…
continue reading
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
1
Bytes, Borders, & Breaches - Ep. 3: The Paper Shield & The Robot Revolt
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28They told us "Cyber War" was about data. They lied. It’s about kinetics. In Episode 03 of Bytes, Borders, & Breaches, we expose the terrifying shift from "Digital Espionage" to "Physical Sabotage." We break down how a single flaw in NVIDIA’s brain chip lets hackers drive robots into walls, how the new "CRINK" alliance has industrialized destruction…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 data breach
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46Coupang recovers laptop allegedly thrown into river Trust Wallet reports 2k+ wallets drained Sax discloses 2024 data breach Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. …
…
continue reading
1
Episode 47 - Attempts by Wild Killer Whales to Provision People
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34Returning guest Jared Towers from Bay Cetology joins us on this episode of After the Breach Podcast to discuss a paper he co-authored in the Journal of Comparative Psychology, "Testing the Waters: Attempts by Wild Killer Whales (Orcinus orca) to Provision People (Homo sapiens)." Before getting into the paper, we talk a bit about the recent release …
…
continue reading
…
continue reading
Send us a text We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for …
…
continue reading
In this episode of Breaching the Boardroom, business leaders and experts share actionable insights on the evolving landscape of the workforce, the importance of elevating human potential through technology and strong company culture, the significance of building relationships, personal growth through education, and the value of networking in profes…
…
continue reading
1
React2Shell Vulnerability, Black Force Phishing Kit, Microsoft OAuth Attacks, and PornHub Data Breach
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
…
continue reading
1
Stop Taking Bad Advice. An Open Letter To The World
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02Question? Text our Studio direct. We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring tr…
…
continue reading
1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
56:51
56:51
Play later
Play later
Lists
Like
Liked
56:51Question? Text our Studio direct. Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over th…
…
continue reading
1
NYC Inauguration bans Flipper Zero, UK taxes crypto, Finland seizes ship
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15NYC mayoral inauguration bans Flipper Zero and Raspberry Pi devices Crypto must now share account details with UK tax officials Finland seizes suspected cable sabotage ship Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to impleme…
…
continue reading
1
Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not. One theme rises above the rest: visibility remains the foundation of everythi…
…
continue reading
1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27Question? Text our Studio direct. Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversa…
…
continue reading
In part nine of "Ashes of Malifaux," we reach the end of the saga of the Burning Man. As the dust and ash settle, who will benefit and who will perish? Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)…
…
continue reading
1
Unleash Protocol hackers drain millions, DarkSpectre campaigns exposed, Shai-Hulud attack led Trust Wallet heist
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Hackers drain millions from Unleash Protocol DarkSpectre campaigns exposed Shai-Hulud attack led Trust Wallet heist Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us …
…
continue reading
1
After the Blast: How One CEO Fought Back 💥 | A True Crime
1:21:20
1:21:20
Play later
Play later
Lists
Like
Liked
1:21:20Question? Text our Studio direct. Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Season 8 is officially h…
…
continue reading
On this month's episode of Smells Like Identity Hygiene, we chat with SPHERE's own founder and CEO Rita Gurevich! Don't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHER…
…
continue reading
1
Ep 18 - Brace Yourself for 2026: AI-Powered Mayhem and Coffee-Fueled Product Security Predictions
1:07:11
1:07:11
Play later
Play later
Lists
Like
Liked
1:07:11🎙️ Coffee, Chaos and ProdSec, Ep 18 2026 is getting closer, and security is already acting weird. So this week, Kurt and Cameron grab their mugs and talk through what they see coming next for Product Security and the teams trying to keep up. From AI agents showing up in the SOC, AppSec, DevSecOps, and GRC, to supply chain risks getting deeper and h…
…
continue reading
1
Silver Fox targets Indian users, Mustang Panda deploys ToneShell, will prompt injection ever be 'solved'?
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25Silver Fox targets Indian users Mustang Panda deploys ToneShell Will prompt injection ever be 'solved'? Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in…
…
continue reading
1
Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats…
…
continue reading
1
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Question? Text our Studio direct. New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack stra…
…
continue reading
1
Ep. 37 - Emennet Pasargad Exposed: How Iran’s IRGC Cyber Unit Targets Organizations — and How to Stop Them
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07Emennet Pasargad is one of the most active and aggressive Iranian cyber threat groups operating today — tied directly to the Islamic Revolutionary Guard Corps (IRGC) Cyber Electronic Command. In this episode of Cyber Resilience Brief, SafeBreach Senior Sales Engineer Adrian Culley breaks down who Emennet Pasargad really is, how they operate through…
…
continue reading
1
Episode 232: The Very Private Digital New Year Episode
35:47
35:47
Play later
Play later
Lists
Like
Liked
35:47Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading
1
The Department of Know: year in review and predictions
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47Link to episode page To end off a tumultuous year, our final Department of Know episode of 2025 features a chat between host Rich Stroffolino and producer Steve Prentice. Join them as they chat about the biggest stories of 2025, the trends we are seeing, and what we can expect in the new year. Thanks to our show sponsor, ThreatLocker Want real Zero…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro…
…
continue reading
1
Rainbow Six Siege breach, backup generators for AI, LastPass reverberations
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Rainbow Six Siege suffers breach, gamers go shopping Diesel generators and aircraft engines in high demand to power AI LastPass 2022 breach reverberates through crypto world Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implem…
…
continue reading
1
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB th…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:04:04
1:04:04
Play later
Play later
Lists
Like
Liked
1:04:04Question? Text our Studio direct. What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is t…
…
continue reading
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be patched. This was one of my favourite interviews this year. Listening to what Brian has learned and understanding how we can use th…
…
continue reading
1
Famous Hacker Reveals TRUE Ethical Hacking Stories
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Question? Text our Studio direct. 🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brok…
…
continue reading
1
Federal Court Just Dealt a Major Blow to Age Verification Laws
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09A federal court just blocked Texas's age verification law—here's why that matters for the entire US. Plus: AI police cameras exposed to the internet, massive data breaches, and why we're all returning to monke for the holidays. This week's Surveillance Report covers: - Federal judge blocks Texas age verification (and the precedent this sets) - AI s…
…
continue reading
1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:28:28
1:28:28
Play later
Play later
Lists
Like
Liked
1:28:28Question? Text our Studio direct. If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “…
…
continue reading
1
Fortinet VPN exploit, Google gmail change, Aflac breach update
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintai…
…
continue reading
1
The Ransomware Ecosystem: An Encore Holiday Episode
1:15:54
1:15:54
Play later
Play later
Lists
Like
Liked
1:15:54Jim takes a break for some R&R during the holidays and shares his favorite podcast episodes from the year. He acknowledges that some listeners might have heard these episodes already, while others may find them new. The podcast's production is supported by Meter, a company providing integrated networking solutions. Additionally, support from listen…
…
continue reading
1
Scams target MENA region, pen testers accused of blackmail, DDoS protection faces fresh challenges
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join u…
…
continue reading
1
Defensive Security Podcast Episode 334
1:07:21
1:07:21
Play later
Play later
Lists
Like
Liked
1:07:21Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
…
continue reading
1
CHAOS | Cybersecurity Predictions You Need to Know NOW
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10Question? Text our Studio direct. New Episode🔥CHAOS | Cybersecurity Predictions You Need to Know NOW. Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers …
…
continue reading