The purpose of the Skeptical Analyst podcast is to offer my opinions, remarks, and contemplations about issues at the intersection of the insurance industry, technology, society, and cyber risks.
…
continue reading
Cyber Analyst Podcasts
1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
…
continue reading
Exploring threats to global stability from Ukraine to China to the Middle East with host Gavin Esler – former BBC News presenter, Washington correspondent and host of Newsnight – plus Ukraine-based war reporter Oz Katerji and independent conflict analyst Emma Beals. This Is Not A Drill dives deep into the dangers, corruption, conflicts, disinformation, rivalries and ruthless realpolitik that are making our world ever more dangerous. Support This Is Not A Drill on Patreon from just £3 per mon ...
…
continue reading
1
The TWIML AI Podcast (formerly This Week in Machine Learning & Artificial Intelligence)
Sam Charrington
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
…
continue reading
Experiments in Risk Science
…
continue reading
The CYSA+ Audio Course is your complete, exam-focused companion for mastering the CompTIA Cybersecurity Analyst (CYSA+) certification. Designed for learners who are always on the move, this Audio Course transforms the official exam objectives into clear, structured, and easy-to-follow lessons. Each episode helps you understand, retain, and apply key cybersecurity analysis skills—covering threat detection, vulnerability management, security architecture, and incident response. Whether you’re ...
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Welcome to Sibylline Insight, the podcast where we delve into the intricate world of global intelligence and geopolitics. Join our hosts as they sit down with members of the Global Intelligence Team to provide in-depth analysis and context to the most pressing geopolitical developments of our time. Each episode features long-form interviews that unravel the complexities behind current events, offering listeners a unique perspective on international affairs. Whether you’re a seasoned analyst ...
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
“When men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas — that the best test of truth is the power of the thought to get itself accepted in the competition of the market” - Supreme Court Justice Oliver Wendell Holmes Jr., Abrams v. United States (1919) Some of the most important issues that face society today are diff ...
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
…
continue reading
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
…
continue reading
A gripping financial technology spy thriller. Produced by a former CIA officer. *****YOU CAN NOW BINGE SEASON 1. SEASON 2 IS FORTHCOMING***** The story: Jabbari Lincoln is the CIA's top financial analyst. He happens to be Muslim. And he's at the top of his professional game when he is unfairly suspected of being disloyal to the United States and gets suspended by the Agency. Dejected and disgraced, he takes on a central bank consulting gig in Nigeria. But as he uncovers a sophisticated cyber ...
…
continue reading
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
…
continue reading
Motor trade radio is your internet radio show dedicated to the global automotive industry. Each week we bring you guests from all over the world who have lived and breathed the auto industry.
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Offical Podcast feed for SiliconANGLE Media's podcast where our hosts and guests reflect upon the many events the CUBE provides coverage for. @theCUBE@dvellante@stu@furrier
…
continue reading
1
Europe's drone wall – Could it hold back Russia?
35:40
35:40
Play later
Play later
Lists
Like
Liked
35:40A series airspace violations by Russian jets and drones have increased tensions over European skies – could a new ‘drone wall’ now protect Europe’s Eastern flank? With plans announced for a new aerial defence system to protect Eastern borders, how would a drone wall work, and can the EU and NATO deliver on promises to improve Europe’s defences? In …
…
continue reading
1
CRSP07: State of AI 2025 pt.2 - For the love of data with Indhira Mani, Intact Insurance
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33In this second episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week, Dave, Esmee, and …
…
continue reading
1
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
…
continue reading
1
Atroposia RAT: The Malware That Scans for Its Own Exploits
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers…
…
continue reading
1
Why Cloud Threats Are Escalating: Identity Risks, Automation Flaws, and Legacy Vulnerabilities, Plus the Latest on Chinese APT Campaigns and NPM Package Abuse
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12) Malicious NPM Packages (7:20…
…
continue reading
1
EP18 10,000 DLLs and Too Much Math - Wrapping Up FLARE-On 12 with the FLARE Team
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45In this episode, we sit down with Nick Harbour, Blas Kojusner, Moritz Raabe, and Sam Kim — members of the FLARE Team and some of this year’s challenge authors — for a deep dive into the design and execution of FLARE-On 12. The team discusses the complexity and intent behind this year's challenges, including how Sam created his grueling final challe…
…
continue reading
1
#70 From Teen Hacker to Professional Pentester: The Journey of Kyle Hoehn
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34In this episode of The Hacker’s Cache, Kyser Clark sits down with seasoned penetration tester Kyle Hoehn to unpack the journey from a curious teen experimenting online to a full time professional in offensive security. Kyle shares how early exposure to computer tinkering and real world troubleshooting shaped his path, why foundational IT knowledge …
…
continue reading
1
Introducing AML Conversations – Technology, Compliance, and the Future of Financial Crime Prevention
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26In this special episode, BCG on Compliance is sharing a conversation originally recorded on the AML Conversations podcast, hosted by John Byrne of AML RightSource. Our host Hanjo Seibert joins John for a deep dive into the evolving role of technology in financial crime compliance—and what the future may hold. They discuss how the perception of comp…
…
continue reading
1
SANS Stormcast Wednesday, November 5th, 2025: Apple Patches; Exploits against Trucking and Logistic; Google Android Patches
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
…
continue reading
1
Building an AI Mathematician with Carina Hong - #754
55:52
55:52
Play later
Play later
Lists
Like
Liked
55:52In this episode, Carina Hong, founder and CEO of Axiom, joins us to discuss her work building an "AI Mathematician." Carina explains why this is a pivotal moment for AI in mathematics, citing a convergence of three key areas: the advanced reasoning capabilities of modern LLMs, the rise of formal proof languages like Lean, and breakthroughs in code …
…
continue reading
1
SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
…
continue reading
1
Balancing Education and Real-World Cybersecurity with a SOC Analyst Student
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV. The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares…
…
continue reading
1
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
…
continue reading
1
▶️ Lenders strike back on FCA consultation. October trade values. Geely's UK debut. (E71 S11)
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38Catch the big car retailing stories and all the chatter that matters with Philip and Curtis on this week's Motor Trade Radio podcast, powered by MOTORS. This week for your listening pleasure! 🎙️cap hpi's Chris Plumb on October's trade value trends 🎙️The erupting row between lenders and the FCA over its consultation process 🎙️Geely becomes the lates…
…
continue reading
1
From Culinary Arts to Cybersecurity: The Journey and Humor of Dan 'Haircut Fish' Rearden
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this episode of Simply Secured, host James Mcquiggan engages in an insightful and entertaining conversation with Dan “The Haircut Fish” Rearden. Dan shares his unconventional journey from various odd jobs and college culinary arts to becoming a SOC analyst. Dan talks about his love for technology, self-guided learning through TryHackMe, and tran…
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
continue reading
1
⚠️ USED VALUES POD October's used car trade values dip just -1.1%. Exclusive lowdown from cap hpi's Chris Plumb (E70, S11)
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25⚠️USED CAR VALUES EXCLUSIVE ⚠️ We've got the full lowdown on cap hpi's October used car trade values on the Motor Trade Radio podcast, powered by MOTORS. Head of Current Car Valuations Chris Plumb takes us through what drove the small -1.1% (£225) dip in values. Talking points include: ➡️ Headline trade values at 3yrs/60,000 miles ➡️ A look at tren…
…
continue reading
1
CR114: Why human experience matters more than ever with Kevin Magee, All human
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39Technology can scale almost everything—except human experience. In a world driven by efficiency, what does it mean to design for how people truly feel? It's about transforming user interactions into ongoing insight and innovation, rooted in empathy and understanding. This week, Dave, Esmee and Rob talk to Kevin Magee, Chief Technology Officer at Al…
…
continue reading
1
Big Tech, A.I. and the dictators – Inside the future of authoritarianism
23:22
23:22
Play later
Play later
Lists
Like
Liked
23:22What will happen when dictators realise just how useful big tech and the data it gathers could be for them? How is this already happening – and how could it expand, as A.I. ramps up the way draconian governments can use tech? Bruce Schneier, a renowned cyber security expert, best-selling author and co-author of Rewiring Democracy How AI Will Transf…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
continue reading
1
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50Got a question or comment? Message us here! “I’m not a robot.” 🤖 Hackers are exploiting fake “I’m not a robot” CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the sho…
…
continue reading
1
Why Cyber Threats Surge 20% During M&A, Plus the Latest on Qilin and Lazarus Group Campaigns
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John & Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15) Qilin Deploys Cross-Platform Attacks (4:21) Lazar…
…
continue reading
1
#69 Why He Left a Safe Job to Hack Companies for a Living ft. Jim Schultz
33:13
33:13
Play later
Play later
Lists
Like
Liked
33:13In this episode of The Hacker’s Cache, Kyser Clark sits down with Jim Schultz, an OSCP-certified penetration tester, cybersecurity instructor, and consultant with over 15 years of experience. Jim shares his journey from taking apart his first family computer in the 90s to teaching hundreds of students and returning full-time to the world of ethical…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
continue reading
1
High-Efficiency Diffusion Models for On-Device Image Generation and Editing with Hung Bui - #753
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23In this episode, Hung Bui, Technology Vice President at Qualcomm, joins us to explore the latest high-efficiency techniques for running generative AI, particularly diffusion models, on-device. We dive deep into the technical challenges of deploying these models, which are powerful but computationally expensive due to their iterative sampling proces…
…
continue reading
1
Season 1 - Episode 18 (Pedro Kertzman & Freddy Murre)
1:06:43
1:06:43
Play later
Play later
Lists
Like
Liked
1:06:43"Basically, everyone just do whatever they feel like and then call it intelligence." With these provocative words, Freddy Murre cuts straight to the heart of what's wrong with most cyber threat intelligence practices today. Drawing from 13 years of intelligence experience spanning military operations and private sector work, Freddy exposes the crit…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
continue reading
1
🎙️ From Rachel Reeve's Motability rethink to flying cars and Ian Godbold! (E69 S11)
36:43
36:43
Play later
Play later
Lists
Like
Liked
36:43Join Philip and Curtis for the big car retailing stories and all the chatter that matters on this week's Motor Trade Radio podcast, powered by MOTORS. ⚠️ Is the Motability scheme set for a tax upset in the Budget? 💷 Draft legislation looks at bringing ECOS under BIK tax rules ⚡ Number of EVs sold under the Electric Car Grant revealed ☎️ MOTORS on h…
…
continue reading
1
From Patent Law to Product Security: A Cybersecurity Journey in the Automotive Industry
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27On this week’s episode we chat with Tyson Benson and explore his diverse career as a senior product cybersecurity analyst for ZFI. With a background in patent law, Benson shares his unique insights on the importance of cybersecurity in the automotive industry, particularly as it pertains to software-defined vehicles. Discover the pivotal moments th…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
continue reading
1
The Populist Playbook – How does the right wing connect globally?
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22The rise of right-wing populism has changed politics across the world. From the proliferation of CPAC conferences across the globe to attacks on institutions and political rivals, does a populist playbook pose a threat to democracy? And how can we resist the rise to power of authoritarian leaders worldwide? In today’s episode, Gavin Esler is joined…
…
continue reading
1
CR113: Bridging the digital skills gap in a complex world with Mike Nayler, AWS
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14The skills we teach today will decide the world we live in tomorrow but the digital skills gap is something we've been dealing with for decades, but it’s growing faster than ever, it starts with kids and stretches all the way into late IT careers, and now we're finally taking a more connected, lifelong approach to closing it. This week, Dave, Esmee…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
continue reading
1
Automate to Defend: A Former FBI Agent's Ransomware Guide for CISOs
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John & former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42) North Korean Attacker Adopts EtherHiding (7:53) Phishing Attacks Target LastPass (12:11) Fighting Ransomware…
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
…
continue reading
1
Vibe Coding's Uncanny Valley with Alexandre Pesant - #752
1:12:36
1:12:36
Play later
Play later
Lists
Like
Liked
1:12:36Today, we're joined by Alexandre Pesant, AI lead at Lovable, who joins us to discuss the evolution and practice of vibe coding. Alex shares his take on how AI is enabling a shift in software development from typing characters to expressing intent, creating a new layer of abstraction similar to how high-level code compiles to machine code. We explor…
…
continue reading
1
EP17 What Lurks Beneath: Building a Robust Network at Black Hat with Mark Overholser
1:09:36
1:09:36
Play later
Play later
Lists
Like
Liked
1:09:36In this episode, we're asking the question: "What Lurks Beneath?" We're joined by Mark Overholser, a Technical Marketing Engineer at Corelight who's part of the team running the Black Hat Network Operations Center (NOC). We discuss the incident during Black Hat 2025 that introduced us and revealed the team's proactive approach to protecting every g…
…
continue reading
1
#68 Q&A: Why You’ll Fail in Cybersecurity if You Stop Learning
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this episode of The Hacker’s Cache Podcast, Kyser Clark answers real cybersecurity career questions from whether the OSCP or Hack The Box CPTS is better for breaking into pentesting, to how to renew your Security+ the smart way, and why cybersecurity isn’t for those who hate learning. He also exposes the truth behind bootcamps, entry-level job m…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln;
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
…
continue reading
1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack
9:17
9:17
Play later
Play later
Lists
Like
Liked
9:17Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
…
continue reading
1
From Help Desk to SOC: How KevTech Broke Into Cybersecurity Without Certs
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40What happens when you go from fixing executives’ laptops at Goldman Sachs to defending against cyber threats in a SOC? In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Kevin Apolinario — better known as KevTech — to unpack his journey from IT support to cybersecurity analyst, all without a single certification. Kev…
…
continue reading
1
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
…
continue reading
1
⚖️ The return of Dieselgate as a High Court case opens against multiple OEMs. Acquisitions, financials and more! (E68 S11)
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29⚠️ Catch the big car retailing stories and all the chatter that matters on this week's Motor Trade Radio podcast, powered by MOTORS. ⚖️ The return of Dieselgate as five OEMs face a major lawsuit in the High Court, accused of cheating on emission tests 💷 Close Brothers nearly doubles its provision for the FCA's finance mis-selling redress scheme 🔌 M…
…
continue reading
1
Harmonizing Cybersecurity: From Trombone to Tech with Debon Grady
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24Today we chat with Debon Grady, an IT Security Specialist with the South Carolina Department of Mental Health. Debon shares his unique path from music education major to cybersecurity expert, discussing key moments, valuable skills learned, and the importance of mentorship. Discover his thoughts on the relationship between red and blue teams, the s…
…
continue reading
1
The Gen Z Protests Sweeping the Globe | Sibylline Insight Ep. 41
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33In this episode of the Insight Podcast, Intelligence Analysts James Barrett and Megan Sutcliffe explore the recent wave of Gen Z protests across the globe, focusing on significant movements in Nepal, Peru, and Madagascar. They discuss the causes, impacts, and political ramifications of these protests, emphasising how social media and youth activism…
…
continue reading
1
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
…
continue reading
1
China and Russia vs. You — Inside the new cyber war
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Cyber attacks are on the rise and the threats impact us all. Which countries are leading these moves and how can we combat them? Britain’s National Cyber Security Centre says that the UK faced four ‘nationally significant’ attacks a week on average in the past year. It adds that China poses a "capable" cyber threat, "targeting a wide range of secto…
…
continue reading
1
CRSP06: State of AI 2025 pt.1 - Evolving role of AI across industries with Craig Suckling [AAA]
53:26
53:26
Play later
Play later
Lists
Like
Liked
53:26In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations face—sometimes getting a little messy along the way. We’re launching a special AI mini-series exploring how artificial intelligence is reshaping industries. Each episode dives into key themes like scaling AI, s…
…
continue reading
1
SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
…
continue reading