Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Cyber Attack Podcasts
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Series that demystifies health issues, separating fact from fiction and bringing clarity to conflicting health advice.
…
continue reading
Two brothers improvise stories by playing the card game 'Once Upon a Time' Our hilarious storytelling is guaranteed to make you laugh, or your money back! New episodes on the 15th of every month. That schedule may change slightly if a global cyber attack breaks the internet since we'd need to mail you new episodes on USB drives and we haven't fully tested that system yet. Our best recommendations for new listeners: Mark - Sonny and Rayne, The Master and the Nose, Operation Cheddartop Geoff - ...
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
News and views on business and the world of personal finance. Plus the very latest from the financial markets around the globe
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Investor Shayle Kann is asking big questions about how to decarbonize the planet: How cheap can clean energy get? Will artificial intelligence speed up climate solutions? Where is the smart money going into climate technologies? Every week on Catalyst, Shayle explains the world of climate tech with prominent experts, investors, researchers, and executives. Produced by Latitude Media.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
News and features from Israel
…
continue reading
The Business With Astrid Ascar & Ian Fraser. We chat with Carrick Wealth about UK Pensions and about a new way your business may be under cyber attack!
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
You deserve to be hacked. Not because you’re weak. But because you’re worth attacking. These are real stories from the front lines of offensive cybersecurity. Conversations to challenge how you think about security and show why the only way to stay ahead is to stay on the attack
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Conversations with fashion industry innovators and disruptors discussing solutions to real industry challenges.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
SC Media and Snyk are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Customer Service is a podcast by Canoe Club where we ask and answer questions with guests about style, culture, and more.
…
continue reading
The cyber security podcast from SE LABS ® - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
In Post Mortem, engineers reflect on real-life incidents of IT systems they experienced. In each episode, we zoom on a specific event, ranging from a system outage, a cyber-attack, or a machine learning algorithm going wild with production data. We try to understand what happened and how the people behind those systems solved the situation. Along the way, you'll get hands-on advice shared by experienced practitioners that you can implement within your team to limit the risk of such incidents.
…
continue reading
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
MOORE IN THE MORNING WITH JOHN MOORE — Toronto's most listened to morning show. Breaking news traffic and weather with the country's most respected commentators. Live interviews with the newsmakers of the day. Local, National and International news.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Cyber Security Townsville is your trusted source for staying ahead of cyber threats and protecting your business in North Queensland. Hosted by industry experts, this podcast delivers actionable insights, practical advice, and the latest trends in cyber security—all tailored for Townsville’s local business community. From ransomware to phishing scams, each episode dives into real-world threats, local case studies, and strategies to keep your business secure. Whether you're a small business o ...
…
continue reading
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
The definitive business podcast from the BBC. Each week, the BBC's Evan Davis is joined by bosses, entrepreneurs and industry experts, to lift the lid on how their businesses work, and what it’s like to be in charge. They discuss a big issue, a big challenge, or a big question facing their industry. From managing AI to managing millennials, from supermarkets to supercharging a new product. And our guests will share their stories of success and failure along the way. Podcasts are published ev ...
…
continue reading
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
Speedwell Research spends hundreds of hours researching public businesses each month and in "The Synopsis" they share their key learnings. Most business podcasts are superficial and assume their listeners are unsophisticated. In contrast, The Synopsis trusts listeners are interested in learning about complex, industry-specific issues, so long as they are explained clearly. We cover businesses from inception to current day, coupling business analysis and an investors lens. Start listening tod ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading

1
The 3-Minute Rule: How to Detect and Kill Cyber Attacks Before They Destroy Your Business
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30Episode Description Learn the most cost-effective way to protect your business from cyber attacks and reduce your cyber liability insurance costs. This episode reveals how insurance companies are leading the fight against cybercrime with cutting-edge monitoring technology that you can access for less than the cost of hiring dedicated IT security st…
…
continue reading

1
Hour 2: Hamilton Cyber Attack, Tariffs To Start Friday, Round 1
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03By iHeartRadio
…
continue reading

1
A look into the minds of the cyber attackers
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Israel, long a prime target for cyber attacks, has seen a dramatic increase since the war with Iran last month. The cyber attackers are not just hitting institutional sights, but also going after civilians with sophisticated phishing campaigns, mostly to steal money. Reporter Arieh O’Sullivan spoke with Ori Segal, a co-founder and CEO of Cyvore, an…
…
continue reading

1
teissTalk: Refining your API security strategy to protect against AI-driven attacks
45:30
45:30
Play later
Play later
Lists
Like
Liked
45:30Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, A…
…
continue reading

1
Dialogue. Evolution 2Q25 Business Update, Black Markets, UK Investigation, Asia Cyber Attacks
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42In this Dialogue episode of The Synopsis, we discuss Evolution's 2Q25 earnings. We also give an overview of regulated vs unregulated markets and different complexities of regulation and solving the Asia Cyber attacks.. Evolution 2Q25 Business Update This update quoted several expert call transcripts from Alpha Sense. You can get a free trial to rea…
…
continue reading
FIDO is the passwordless authentication set of protocols of the future, however that doesn't mean it's perfect and as cyber defenders attack, so do attackers. This novel exploit isn't a flaw within FIDO exploit but does threaten improperly implemented versions of it. Sources: https://pastebin.com/fmUZEBAM…
…
continue reading

1
Aruba password warning, SharePoint zero day, Russian vodka maker attacked
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Hewlett Packard warns of hardcoded passwords in Aruba access points SharePoint zero-day exploited via RCE, no patch available Russian vodka producer suffers ransomware attack Huge thanks to our sponsor, Nudge Security Discover every SaaS account ever created by anyone in your org within minutes of starting a free trial. Harden configs, enforce MFA,…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
Ep. 3: Palo Alto Networks Research and AI Generated Attacks
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25AI vs. Cybersecurity: The New Frontline In this eye-opening episode, host Tova Dvorin sits down with Tomer Bar, VP of Security Research at SafeBreach, and Shelly Zucker, Product Manager at SafeBreach, to unravel the alarming ways AI is transforming the cyber threat landscape—and what it means for defenders. The conversation kicks off with jaw-dropp…
…
continue reading

1
AI Is Attacking Healthcare—Social Engineering EXPOSED. (Dr Sergio Sanchez)
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that’s just the beginning… In this mind-blowing episode, we dive into: · The dark side of AI (…
…
continue reading
Up to 800,000 customers at Betfair and Paddy Power and other companies suffer from a major data breach at parent firm Flutter that exposed personal details and account activity.By BBC Radio 5 Live
…
continue reading

1
Health risks of bin strikes, measles warning and ethics
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06With bin strikes in Birmingham having gone on for months, James Gallagher heads to the Small Heath area of the city to ask what the health risks could be from rubbish left on the streets. He meets campaigners Shafaq, Ashid and Danni from End the Bin Strikes who tell him what residents are worried about. To discuss what diseases could be brewing and…
…
continue reading

1
Russian flights grounded, Naval group breach, dating app exposed
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Hacktivist attack grounds Russian flights Naval group denies breach, hackers beg to differ Dating app breach exposes thousands of women’s pictures Huge thanks to our sponsor, Dropzone AI Let me tell you about Dropzone AI—they're revolutionizing how security teams work. Companies like CBTS and Zapier use their AI to investigate alerts automatically,…
…
continue reading
Sean Farrington has the latest as Google launches "AI mode" in the UK. Plus, the weekly shop keeps getting more expensive, thanks to meat and tea prices.By BBC Radio 5 Live
…
continue reading

1
Locked Out of Your Own Car: When Courts Control Your Vehicle Title and What It Really Means
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19What You'll Learn in This Episode: What is a court-ordered title - A legal process where you file documents with a court to have a vehicle title issued to you when the DMV cannot help Why you might need this process - When you have title issues the DMV is unable or not authorized by law to resolve, such as: Missing title documents Damaged title pap…
…
continue reading

1
When Traditional Insurance Fails: How Parametric Coverage Fills the Gap
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Episode Description Insurance challenges are hitting homeowners nationwide, from California to Florida to Texas and the Midwest. With widespread policy cancellations, skyrocketing premiums, and inadequate coverage limits, traditional insurance is failing when people need it most. This episode explores parametric insurance as an innovative solution …
…
continue reading

1
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
…
continue reading

1
When Traditional Insurance Says No: How Parametric Coverage Is Revolutionizing Impossible-to-Insure Risks
5:52
5:52
Play later
Play later
Lists
Like
Liked
5:52Key Points Covered: Growing Coverage Gaps: More consumers and business owners are finding traditional insurance coverage increasingly difficult to obtain, with significant gaps in protection The Insurance Crisis: Properties in high-risk areas (coastal regions, hurricane zones) face three major challenges from traditional insurers: raising rates, re…
…
continue reading

1
The AI Reckoning: What Leading Scientists and Tech Insiders Really Believe About Our Future
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Episode Description Artificial intelligence has only been around in serious form for a couple of years, but it's already reshaping every aspect of our lives. Is AI a blessing or a threat? This episode examines current data points and expert opinions to help you understand what's really happening and how to plan for the future. Key Topics Covered Th…
…
continue reading

1
The Timeless Warning: How Everett Dean Martin's 'Liberty' Predicted Our 2035 Reality
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15Episode Description In this episode, we explore how current cultural, social, and political upheavals aren't as unprecedented as they seem. Through a review of Everett Dean Martin's 1930 book "Liberty," we discover that the challenges we face today have played out many times throughout history. Key Discussion Points Historical Patterns: Current cul…
…
continue reading

1
Locked Out: Why Nobody's Winning in Today's Housing Market
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Episode Description What's happening with real estate right now? Market softening is appearing across the country, even in traditionally hot markets like Idaho, Florida, and Texas. Builders are offering unprecedented incentives and discounts to move inventory during what should be peak buying season. This episode explores the complex factors creati…
…
continue reading

1
The Billion-Dollar Blind Spot: Why Family Offices Are Cybercriminals' New Gold Mine
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21Episode Description High net worth individuals and family offices face a perfect storm of cybersecurity vulnerabilities. Despite managing substantial wealth, these organizations often lack the robust IT defenses of similarly-sized corporations, making them prime targets for sophisticated cybercriminals using AI and wire transfer fraud tactics. Key …
…
continue reading

1
The $1000 Car Payment Trap: Why You Can't Afford What the Dealer Says You Can
3:28
3:28
Play later
Play later
Lists
Like
Liked
3:28Episode Description In this eye-opening episode, we dive deep into the shocking reality of today's vehicle market and why that $1,000 monthly car payment might be the worst financial decision you'll ever make. With new car prices skyrocketing and the average vehicle now costing $49,000, we break down the mathematics of automotive debt and reveal wh…
…
continue reading

1
Underwater and Upside Down: How to Escape the Negative Equity Trap and Take Control of Your Car Loan
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Episode Description Learn the insider secrets of how car dealerships make money and how you can use this knowledge to reduce your negative equity when doing a car short sale. This episode breaks down the profit margins in automotive sales and reveals actionable strategies to get credits from lenders and dealers to lower your loan balance. Key Topic…
…
continue reading
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
…
continue reading
An Arizona woman was arrested for running a North Korean IT worker laptop farm out of her home, and this gave us a little look into the strange world of how these threat actors are able to infiltrate US organizations. Sources: https://pastebin.com/qvrWirYaBy Chloe Thonus
…
continue reading

1
Hour 4: He's Been Sounding The Alarm About The US For 8 Years Now, Auto Theft Declining Finally, Carney's Cuts
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48By iHeartRadio
…
continue reading

1
Hour 3: Politics in Class, Pool Perils, T is for Terry, Round 2
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47By iHeartRadio
…
continue reading

1
University Presidents call on Netanyahu to solve hunger in Gaza Strip
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15Five presidents of Israel's leading academic institutions are calling on the Prime Minister to act immediately to solve the hunger problem in the Gaza Strip. In an open letter to Netanyahu, they state that along with a growing number of the country's residents, they are watching in shock at the footage coming from the Strip, including images of bab…
…
continue reading

1
Hour 1: Five Things To Know, Sydney Sweeny Ads, Senior House Squatting, World Cup
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55By iHeartRadio
…
continue reading
Israel continues pauses in Gaza Strip fighting to allow humanitarian aid deliveries, Defense Minister vows heavy action if Hamas doesn't release hostages, Houthis threaten to strike any merchant ship calling on Israel See omnystudio.com/listener for privacy information.By כאן | Kan
…
continue reading

1
NASCAR announces breach, Plankey for CISA, 365 Admin outage
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25NASCAR announces data breach following March cyberattack Plankey appears to be on track to lead CISA Microsoft investigates another outage affecting 365 admin center Huge thanks to our sponsor, Dropzone AI Today's sponsor is Dropzone AI, the leader in AI-powered SOC automation. Major companies like Zapier and UiPath are using Dropzone to give their…
…
continue reading
Will Bain looks at the trade deal agreed between the EU and the US. Plus, what does the Lionesses Euros win mean for sponsorship opportunities?By BBC Radio 5 Live
…
continue reading

1
SANS Stormcast Monday, July 28th, 2025: Linux Namespaces; UI Automation Abuse; Autoswagger
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
…
continue reading

1
Risky Bulletin: Microsoft investigates MAPP leak
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23Microsoft investigates a MAPP leak as the source of the SharePoint zero-day, US law enforcement takes down the BlackSuit ransomware portal, an Arizona woman is imprisoned for running a North Korean laptop farm, and Allianz life insurance suffers a security breach. Show notes
…
continue reading

1
Sponsored: Nucleus Security on the evolution of vulnerability management
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14In this sponsored interview, Nucleus Security co-founder and COO, Scott Kuffer joins Casey Ellis to chat about how vulnerability management evolved into quite a lot more than just patch prioritization. Show notes
…
continue reading

1
Facing international pressure, IDF announces new aid measures for Gaza
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Res. Brigadier General Yossi Kuperwasser, head of the Jerusalem Institute for Strategy and Security, says that Israel had no option but to implement the new humanitarian steps in Gaza in light of the impression given to the world of the situation in the enclave. Kuperwasser, a former head of the research division in the IDF military intelligence di…
…
continue reading
Send us a text Ep. 97 of the Cyber Law Revolution is live! In this episode, we discuss the unfortunate breach of the Tea App and lessons learned. First, update your data retention policy (why are we keeping selfies after verification?!). Second, make sure your scaling your cybersecurity with the size and scope of your company. Finally, your PR/cris…
…
continue reading

1
Is Macron's recognition of a Palestinian state such a bad thing?
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34The announcement by president Emmanuel that France would become the first Western member of the United Nations Security Council to recognize a Palestinian state in September has caused diplomatic ructions from the Middle East through Europe to Washington. Israel and its staunch supporter the United States have blasted France's move, branding it a r…
…
continue reading
2 IDF soldiers killed in blast against vehicle in Gaza; third succumbs to injuries from earlier, separate attack. IDF announces daily 10-hour humanitarian pauses in Gaza. Israeli navy intercepts pro-Palestinian activist boat trying to break maritime blockade of Gaza. See omnystudio.com/listener for privacy information.…
…
continue reading

1
Death in Crypto Land. Ultimate Exit Scam.
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23This is the story of a notorious death in cryptoland. Many say it’s the ultimate exist scam. Gerald Cotten, the founder of QuadrigaCX, died in 2018 under mysterious circumstances, leading to the loss of $215 million in cryptocurrency. Despite claims that he passed away due to what is medically considered non-fatal Crohn’s disease while in India, ma…
…
continue reading

1
How Hackers Can Take Down a Nation – Starting With YOUR Wi-Fi Router
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43Your smart home isn’t just smart — it might be spying on you. In this eye-opening episode of the Smarter Online Safety podcast, host Jocelyn King speaks with renowned cybersecurity expert Adriel Desautels, who reveals how everyday IoT devices like your air fryer, drone, and even your Roomba could be compromising your safety — and your data. With 20…
…
continue reading

1
Week in Review: Aruba’s hardcoded passwords, Clorox wipes supplier’s mess, AI tool deletes everything
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Nudge Security Nudge Security discovers new apps, accounts, and data-sharing in real-time and helps guide employees toward secure behaviors. Instead of trying t…
…
continue reading

1
Hour 4: The Passing of Hulk Hogan, Tory's Take, Chuck Mangione Dies, Natasha, Pierre & The Great Comet of 1812
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23By iHeartRadio
…
continue reading
From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what the…
…
continue reading

1
Hour 3: Metrolinx Lawsuits, Celebrities Die In 3s? Round 2
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44By iHeartRadio
…
continue reading

1
Hour 2: How the Hockey Canada dealt with sex assault allegations, Christian Musician May Be Blocked From Performing In Canada, Round 1
37:30
37:30
Play later
Play later
Lists
Like
Liked
37:30By iHeartRadio
…
continue reading