Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
CrowdStrike Podcasts
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Audio only segments of theCUBE's 'Breaking Analysis' hosted by Dave Vellante (@dvellante), Powered by ETR.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Chain of Events. Cause and Effect. We analyse what went right and what went wrong as we discover that many outcomes can be predicted, planned for and even prevented.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
All areas of an organization, even those still in the analog world, are being transformed by technology. This shift isn't just modernizing manual processes with digital tools, but changing the fabric of an organization to support a new way of thinking. So while it may be a buzzword, digital transformation is happening and we're here to unpack it with you. Between big ideas and tiny details is the ten thousand foot view. Join the technology consultants from Vervint as we discuss the changing ...
…
continue reading
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
…
continue reading
Hosted by Betsy Sikma, this ongoing series of 15- to 20-minute podcasts is designed to break down complex topics that have a huge impact on life at Milliken.
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
We make software-related technical topics intelligible. We aim to help you develop an intuitive understanding of each subject, instead of emphasizing formal definitions. Join us as we learn about the wide world of software.
…
continue reading
The Testing Show explores, pokes and prods anything and everything related to testing, with new episodes released every other Wednesday. Our hosts, Matt Heusser and Michael Larsen, will analyze tried and true methodologies and practices against on trend and emerging topics. We have a range of guest contributors from Qualitest as well as industry experts from around the world to share insights, knowledge and personal experience. So take minute to find out what others are saying in the testing ...
…
continue reading
Robert, of SpaceAge Consulting LLC, gets Unwired and talks about the technology behind Audio and Video Production. He and his guests "Take the Technical and make it Understandable". Tune in weekly to hear more tech and tips about all things AV.
…
continue reading
Welcome to ”What the Shell?” where I dive into major hacks and vulnerabilities in a way meant to be accessible by anyone. Come with me as we look at each incident through an exciting lens of curiosity. Join us on our discord if you‘d like to participate in discussions with myself and our guests! https://discord.gg/bJauPBBhHn
…
continue reading
Welcome to Seed to Scale. The podcast where Eniac Ventures sits down with founders, investors, and influencers to discuss all things startups and seed stage. Each episode will be hosted by an Eniac General Partner - Hadley Harris, Nihal Mehta, Tim Young or Vic Singh - to talk about the ups and downs of building an early-stage company, securing funding and what it takes to build a lasting business. Send topics or guest suggestions to [email protected] or @seedtoscale, and please subscribe, ...
…
continue reading
There's a lot on the line for developers. Writing clean code, tracking down and removing bugs, AND shipping features to millions of customers? It's a lot—and devs are people too! The Dev Morning Show (At Night) shares the human side of software development with interviews that start lighthearted but get to the heart of what it takes to perform in the delightfully weird world of software. Join us on the journey!
…
continue reading
I started out wrapping burritos at Chipotle, dreaming of something bigger but not quite sure where to go. Over time, that drive to learn and grow led me into cybersecurity—an industry where the stakes are high and the stories are endlessly fascinating. K.O.’s Launchpad is my way of opening the door for anyone curious about how to break in, level up, and find purpose in a field that’s shaping our digital future. In every episode, we’ll chat with experts, share practical strategies, and explor ...
…
continue reading
CrowdStrike are the global leaders in cybersecurity whose innovative technology and mission to keep their customers protected from attack is disrupting the industry. A Formula For Success features leaders from across the globe discussing their journey to success and how they build a winning culture within their organizations. We sit down with leaders to talk about the technological innovations that are driving their industries as well as diving deeper into what drives these individuals to su ...
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
The X – The Experience – is singlehandedly the most important factor in the success of products, services and entire businesses. The X is hosted by Silicon Valley veterans and product innovation strategists Bryan McClain and Demetrius Madrigal, who bring a combined 30+ years of experience studying human behavior and technology. They've been behind the scenes with everyone from unfunded startups to technology giants and have a unique perspective on current events, how they are shaped by the h ...
…
continue reading
The Ungrowth Show is a captivating podcast that explores the real-world challenges and triumphs of businesses. Hosted by TrellisPoint, each episode dives into the complex battles companies face, from overcoming market hurdles to achieving breakthrough successes. With expert commentary and engaging storytelling, we dissect these business stories to reveal valuable lessons and insights that help others avoid making mistakes. Whether you’re navigating your own business journey or simply interes ...
…
continue reading
1
Cybersecurity Today: Oracle Breach, CrowdStrike Report, and New iPhone Scam
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36In this episode, host Jim Love discusses several significant cybersecurity events and updates. The Washington Post confirmed a security breach affecting nearly 10,000 individuals due to an exploited Oracle E-Business Suite vulnerability. CrowdStrike's 2025 Global Threat Report highlights the rise of 'enterprising adversaries' and a surge in malware…
…
continue reading
1
Extortion Rises and Nation-State Activity Intensifies: The CrowdStrike 2025 European Threat Landscape Report
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00Europe is a prime target for global adversaries. There is a strong emphasis on eCrime across the region as well as a rise in hacktivism and espionage stemming from ongoing conflicts. The CrowdStrike 2025 European Threat Landscape Report breaks down these trends. In this episode, Adam and Cristian cover the highlights. They start with cybercrime, a …
…
continue reading
1
What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP?
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP? At 17, he left his Caribbean home and came to the US. After initial struggles she landed a job and after inserting his way into a tech issue, the trajectory of his career changed and he now sits as the Chief Field CTO for the Americas at Crowdstrike. Send us a text Growth without Interr…
…
continue reading
1
Spies, Lies & Cybercrime--Treason from Inside The FBI
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and trig…
…
continue reading
1
Cybercrime and the Future: An In-Depth Discussion with Tammy Harper, Flare.io
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42In this episode of Cybersecurity Today, host Jim Love is joined by Tammy Harper, a senior threat intelligence researcher at Flare, to explore the future landscape of cybercrime. The conversation delves into various aspects like the evolution of underground markets, state-backed cyber sanctuaries, and decentralized escrow systems. Harper presents in…
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
Lighthouse Phishing Kit Takedown, Zero Day Mysteries, and Measuring Cyber Attack Costs
46:11
46:11
Play later
Play later
Lists
Like
Liked
46:11This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the challenge of trying to quantify t…
…
continue reading
1
End of Life: Time to X goodbye to Windows 10
1:06:26
1:06:26
Play later
Play later
Lists
Like
Liked
1:06:26This week we're discussing the end of support (kind of) for Windows 10 - find out more from Chris and Tom about what you should worry about and what you can do now Windows 10 is officially (mostly) End of Life. Links - Read more about your options: https://privacyinternational.org/news-analysis/5686/end-line-windows-10 - Learn more about PI's posit…
…
continue reading
1
SANS Stormcast Friday, November 14th, 2025: SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
1
BEHIND SCENES of REAL Data Breach Response
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:09What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis. In this full episode, we take you inside the anatomy of a real data breach with digital first responders from …
…
continue reading
1
The Hacker Movie Canon: The Social Network
1:13:02
1:13:02
Play later
Play later
Lists
Like
Liked
1:13:02"You know, you really don't need a forensics team to get to the bottom of this. If you guys were the inventors of Facebook, you'd have invented Facebook." Melanie Ensign joins Dennis Fisher and Lindsey O'Donnell-Welch to discuss David Fincher's massively successful 2010 film, The Social Network, a movie that opens a window into the dark side of Sil…
…
continue reading
1
SANS Stormcast Thursday, November 13th, 2025: OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
…
continue reading
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with …
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
Industrial Phishing Kit QRR Discovered: New Cyber Threats Unveiled | Cybersecurity Today
16:30
16:30
Play later
Play later
Lists
Like
Liked
16:30In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a …
…
continue reading
1
SANS Stormcast Wednesday, November 12th, 2025: Microsoft Patch Tuesday; Gladinet Triofox Vulnerability; SAP Patches
6:03
6:03
Play later
Play later
Lists
Like
Liked
6:03Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
SANS Stormcast Tuesday, November 11th, 2025: 3CX Related Scans; Watchguard Default Password;
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
…
continue reading
1
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybers…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
…
continue reading
1
US Congressional Budget Office Breach, AI in Cyber Attacks & Veterans Defend Canada
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In today's episode, we cover the breach at the US Congressional Budget Office and…
…
continue reading
1
SANS Stormcast Monday, November 10th, 2025: Code Repo Requests; Time Delayed ICS Attacks; Encrypted LLM Traffic Sidechannel Attacks
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
…
continue reading
1
Sam Altman Resets the Economics of AI Factories
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44Breaking Analysis with Dave Vellante and theCUBE ResearchBy SiliconANGLE
…
continue reading
1
A Former Black Hat Hacker Advises Us On Security Weaknesses
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a young age, his transition to ethical hacking, and his experiences working…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
What Are The BIGGEST Cyber Security Risks In SaaS Platforms?
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-s…
…
continue reading
1
Innovative Tools and Tactics in Cybersecurity
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15In this episode of 'Cybersecurity Today,' hosted by Jim Love, the focus is on recent developments and tactics in cybersecurity. The episode discusses Meter's networking solutions, the innovative tactics of the ransomware group Killen using common Windows tools, and three new open-source offerings aimed at improving security: Heisenberg for software…
…
continue reading
1
SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
Get to know Chuck Tsocanos, President and Chief Consulting Officer at Vervint, as he sits down with Ethan Wyant to discuss his career journey and Vervint’s future. Chuck shares insights on leadership, company transformation, and the impact of AI on the tech industry. Topics covered in this episode: Chuck’s background, career path, and move to Vervi…
…
continue reading
1
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
…
continue reading
1
Digital Dependence EXPOSED--A Billion Dollar MELTDOWN & AI SECRETS
45:48
45:48
Play later
Play later
Lists
Like
Liked
45:48When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance. We break down: 💥 The $550M AWS outage & how it spr…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Ransomware Insider Threats, AI Vulnerabilities, and Major Security Gaffes
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14In this episode of Cybersecurity Today, host Jim Love dives into several shocking security lapses and emerging threats. Highlights include ransomware negotiators at Digital Mint accused of being behind attacks, a new AI vulnerability that exploits Windows' built-in stack, and a misuse of OpenAI's API for command and control in malware operations. A…
…
continue reading