Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Cyber Podcasts
They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they’re accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be next? And where is the money going? Latest season: Evil Corp. The Russian Evil Corp is accused of being a family crime gang, responsible for stealing ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading
The Cyber Nerds - Beyond The Sofa's Podcast Reviews. Discussions. Arguments. Beyond the Sofa is the official podcast from the best YouTube reactors on the planet. Tune in to weekly episodes.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
1
SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow https://appomni.…
…
continue reading
Shoot us a Message and It might feature on our next Podcast Episode! Chapter Eight: The Rightside Up Our heroes prepare to fight Vecna as he plans to end the world as we know it. Meanwhile, in Vecna's mind, the kids are racing to escape. Support the show Watch our exclusive content and daily show reactions here TCN Patreon Can't get enough of us? S…
…
continue reading
1
🔴 Jan 14’s Top Cyber News NOW! - Ep 1046
1:32:02
1:32:02
Play later
Play later
Lists
Like
Liked
1:32:02The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber…
…
continue reading
Cyber Daily News January 14, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Microsoft Patch Tuesday January 2026: Actively Exploited Zero Day, 8 High-Risk Flawshttps://thecyberexpress.com/patch-tuesday-january-2026-zero-day/- MS-ISAC Flags High-Risk Security Fla…
…
continue reading
1
Instagram Data Leak: What 17.5 Million Exposed Accounts Really Mean for Your Privacy
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53A quiet data exposure tied to millions of Instagram accounts is raising new questions about privacy, trust, and how modern scams really work. In this episode of Darnley’s Cyber Café, we look at why this incident matters even without a confirmed breach, how small pieces of data quietly increase risk, and what you can do to better protect your Instag…
…
continue reading
1
The Hammer and the Anvil: Offensive Cyber Strategy with Chris Inglis
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Chris Inglis joins Frank Cilluffo to break down what offensive cyber strategy should look like in an era of strategic competition. Drawing from the McCrary Institute's new report on U.S. cyber policy, Inglis argues that resilience and consequences are not competing theories—they have to work together. He explains why "defend forward" and persistent…
…
continue reading
1
Dr. Yaniv Harel cyber expert & key figure in bridging between cyber industry and academia in Israel
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51בניגוד להרבה תחומים אחרים בסייבר התעשייה והאקדמיה הולכים יד ביד ולעיתים דווקא האקדמיה היא זו שדוחפת את החדשנות בתעשייה לקצוות. לראיה ה CyberWeek של אוניברסיטת ת"א מצליחה פעם אחר פעם לרכז את מיטב המוחות לדון על הווה ועתיד, למה הפעם זה כן עובד? שמדובר בסייבר הישראלי בצורה מפתיעה (או שלא) תמיד תפגשו את ד"ר יניב הראל. יניב מלווה את הסייבר האזרחי בישראל…
…
continue reading
1
Is the cyber talent ecosystem broken? [CISO Perspectives]
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36Please enjoy this encore of CISO Perspectives We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episod…
…
continue reading
1
Why Your AI Needs Guardrails (Even If You Don't Think So) | AI 101
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10In this episode of CS Cyber, Chad and Sean continue their AI 101 series, focusing on the critical aspects of guardrails ai and safety basics for artificial intelligence. We discuss how guardrails are essential for product safety, ensuring AI systems remain aligned with their intended functions and do not produce unintended or excessive outputs, tou…
…
continue reading
1
The Evolving Threat Landscape – Offensive Security in Action
21:15
21:15
Play later
Play later
Lists
Like
Liked
21:15Defences are only as strong as what you test. Are you ready? Join Rui Shantilal, Group VP Cyber Trust, and guest Bruno Morisson, Global Head of Offensive Security at Devoteam Cyber Trust, as they explore why offensive security has become essential for modern cyber resilience. In this episode, discover how ethical hacking, penetration testing, and r…
…
continue reading
1
Roundtable Edition: AI, Regulation & the Future - Can We Govern What We Don’t Fully Understand?
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09Send us a text In this special roundtable episode of Secure Insights, we bring together leading voices from across cybersecurity, AI, and legal to explore one of the most pressing questions of our time: how do we regulate AI without stifling its potential? Joining the discussion are James Morris, Director at NDK Cyber, Peter Garraghan, Founder & Ch…
…
continue reading
1
Episode 102: Episode 102 - Part 3 - Security knowledge alone is not enough
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37Richard continues his discussion about the non-security skills you require to be successful in a cyber role.
…
continue reading
1
#92 – Unintended Training for AI – What You Should Know
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19Amazon warned employees after ChatGPT divulged proprietary data. That is not a theory—it is a real AI risk. In this episode, Walter Haydock, Founder of StackAware, exposes "unintended training," how it happens, and how employees can use AI without leaking confidential data.By Vivid Technology Group
…
continue reading
1
Blending Technology, Facilities, and Leadership in Hybrid Work with Chris McCay
39:47
39:47
Play later
Play later
Lists
Like
Liked
39:47Guest Introduction Chris McCay serves as Vice President for Corporate Infrastructure at Brailsford and Dunlavey, a national program management and development advisory firm supporting higher education institutions, municipalities, sports organizations, and K 12 districts. In his role, Chris oversees IT, corporate real estate, facilities operations,…
…
continue reading
1
Instgram Breach Exposes 17.5 Million Accoounts
7:20
7:20
Play later
Play later
Lists
Like
Liked
7:20Instagram users saw a barrage of password reset attempts on their accounts and it seems to be related to a dataset that was just leaked to BreachForums of scraped user data. Sources: https://pastebin.com/AfMVFBDmBy Chloe Thonus
…
continue reading
1
RCR 162: Small and Medium Business the Prime Target for Cyber Criminals
35:20
35:20
Play later
Play later
Lists
Like
Liked
35:20Think your company is too small to attract hackers? That misplaced confidence is exactly why SMBs are prime targets. We break down the real economics driving cybercrime—ease, scale, and profit—and show how default settings, fragile backups, and identity gaps create the perfect on-ramp for ransomware, credential theft, and supply chain abuse. We als…
…
continue reading
1
Subscriber Data Exposed and Hotels ClickFix Phished
1:04:09
1:04:09
Play later
Play later
Lists
Like
Liked
1:04:09This week on The Awareness Angle, everyday systems, subscriptions, and trusted tools keep showing how easily they can be turned against us. From major data breaches affecting millions to phishing tactics designed to look like system failures, the theme this week is familiarity, and how attackers exploit what people already trust. We kick off with B…
…
continue reading
1
The CISO Brief: Compliance and incident response
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01In this first episode of The CISO Brief, the Cyber Daily team unpacks the OAIC's spot compliance checks, the role of legal counsel in cyber incident response, and how small financial services providers can keep themselves safe. Welcome to the first episode of Cyber Daily's The CISO Brief, a weekly news podcast to help business leaders navigate the …
…
continue reading
1
24. What Happens If Hackers Poison the Water? Interview with Lesley Carhart
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19We’ve seen the latest AFR headlines: “Spy chief warns hackers could cut power, poison water, crash banks.” But who do you call when those headlines become real life? In this episode, we’re joined by Lesley Carhart, Technical Director of Industrial Incident Response at Dragos. Lesley is one of a few people in the world who has the skillset to walk i…
…
continue reading
1
The Threat WITHIN | Psychological Cybersecurity
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29What if the biggest performance risk in your company isn’t burnout, AI disruption, or digital overload… but your subconscious operating system? In this deep-dive conversation, we sit down with internationally recognized behavioral health expert and leadership strategist David Kingsbury, LPCC-S, LCADC, NCC, ICAADC to uncover the hidden identity-leve…
…
continue reading
1
Redefining Leadership How Purpose and Service Drive Change in Higher Education
1:05:58
1:05:58
Play later
Play later
Lists
Like
Liked
1:05:58Dr.Constance St.Germain joins the show to explore what it means to lead with purpose in todays educational landscape. From her time in the Armys JAG Corps to her leadership at Capella University, Dr.St.Germain discusses resilience, AI innovation, and the importance of creating pathways for women in leadership. Connect with Dr. St. Germain: LinkedIn…
…
continue reading
1
Resilient Cyber w/ Jerry Gamblin - CVE Retrospective & Looking Forward
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41In this episode of Resilient Cyber I'm joined by one of my favorite Vulnerability Researchers, Jerry Gamblin. Jerry recently published a comprehensive 2025 CVE retrospective, which we will dive into, as well as his thoughts around trends and patterns we may see emerge in the vulnerability management landscape moving into 2026 and beyond.…
…
continue reading
1
Episode 163: The Vendor Security Trap: Are You Losing Control?
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs…
…
continue reading
1
ESA confirms new data heist, Ni8mare lets hackers hijack n8n servers, Taiwan blames 'cyber army' for intrusion attempts
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03ESA confirms new data heist Ni8mare lets hackers hijack n8n servers Taiwan blames 'cyber army' for intrusion attempts Huge thanks to our sponsor, Hoxhunt Traditional security training fails because it treats employees like the problem. Hoxhunt treats them like the solution. AI-powered simulations mirror actual attacks hitting your inbox. Instant co…
…
continue reading
1
Episode 24- How Medical Device Security Protects Care At Scale. With Phil Englert
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04A hospital room can hold 10 to 20 networked devices, each vital to care—and each a potential doorway for attackers. We sit down with Phil Englert, VP of Medical Device Security at Health ISAC, to explore how connected care improves outcomes while reshaping risk, and why building resilience and rapid recovery plans is now as critical as prevention. …
…
continue reading
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/ https://cybersecuritynews.com/mongobleed-poc-exploit-mongodb/ https://cybersecuritynews.com/fortigate-firewall-vulnerability/ …
…
continue reading
1
21 - Managing Cyber Risk: The Insurance Component Leaders Shouldn't Overlook
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34In this episode, we take a practical look at how cyber insurance fits into the broader world of organizational risk. While we often talk about risk from a security and compliance perspective, insurance brings its own lens, which has become increasingly important as threats evolve, and claims grow more complex. Today's guest, Mark Westcott, Presiden…
…
continue reading
Summary Join Hunain Amir, the Cyber Sensei, as he delves into his journey in cybersecurity. Discover the importance of hands-on experience, the role of mentorship, and how education can shape future cybersecurity professionals. Gain insights into the blend of technology and psychology that defines this dynamic field. Show Notes Follow Amir https://…
…
continue reading
1
Dune Security's Revolutionary Approach: AI and Cybersecurity
34:08
34:08
Play later
Play later
Lists
Like
Liked
34:08*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:0cf8a03d-e57a-43f6-9f7c-26bb6994647d-20" data-testid= "conversation-turn-42" data-scroll-anchor="true" data-turn= "assistant"> 🎙 Episode 48: AI and Cybersecurity — How Dune Security Is Reinventing User Risk M…
…
continue reading
Este documento sintetiza un análisis del abuso sexual basado en imágenes (IBSA), trazando su evolución desde hackeos dirigidos a celebridades hasta la amenaza actual de los "deepfakes" generados por IA. Las fuentes revelan un cambio significativo en la comprensión y la terminología, alejándose de la etiqueta engañosa "pornografía de venganza" hacia…
…
continue reading
1
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
…
continue reading
1
Ben Fletcher and Dockworker Power – SEDI Hosts Peter Cole
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23On November 23, 2025, the Sam and Esther Dolgoff Institute (SEDI) hosted historian Peter Cole for an expansive talk on Ben Fletcher, the Industrial Workers of the World (IWW), and the radical legacy of dockworkers’ internationalism—from Philadelphia’s segregated waterfronts to Durban, South Africa, and beyond. Cole traced the rise of the Marine Tra…
…
continue reading
1
Ep. 60 – Defensible Truth in DFIR: Why Preserving Evidence Beats Quick Fixes – with Devon Ackerman
54:31
54:31
Play later
Play later
Lists
Like
Liked
54:31In incident response, if you wipe systems first and ask questions later, you’re deleting the truth. In this episode, host Anthony Hess sits down with Devon Ackerman, Global Head of Digital Forensics and Incident Response at Cybereason, to unpack what serious DFIR looks like when your audience is regulators, legal counsel, and insurance carriers and…
…
continue reading