Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Defense Podcasts

show episodes
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork

301
Channel Security Secrets

Cyber Defense Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
  continue reading
 
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
Cyber Defense Indonesia

Cyber Defense Indonesia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

4
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
The Cyber Riddler

Ahmad Almorabea

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
Artwork

851
Ingram's Insights

Philip Ingram MBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Taking the cannel to new levels giving short insights to geopolitical issues around the world that everyone should be aware of. Philip INGRAM MBE, is a former senior British Military Intelligence officer and now presenter, presenters friend and commentator on Times Radio, Talk, Sky News, the BBC and many other global channels
  continue reading
 
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
  continue reading
 
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
  continue reading
 
Artwork

51
Cyber Security America

Joshua R Nicholson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
  continue reading
 
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
  continue reading
 
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
Artwork

4
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
WTR Small-Cap Spotlight

Water Tower Research

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
WTR Small-Cap Spotlight is your weekly guide to uncovering hidden value in the world of small-cap stocks. Each episode features insightful interviews with C-level executives, industry thought leaders, and Water Tower’s expert analysts. Tune in for actionable investment ideas and in-depth discussions on under-the-radar opportunities that can make a big impact on your portfolio
  continue reading
 
Artwork

1
Worldwise Wealth

Nicole Vilaca

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Worldwise Wealth is a podcast designed for global-minded entrepreneurs and investors eager to build borderless lives. Each episode dives into strategies for international diversification, including second residencies and citizenships, unlocking new financial landscapes, and understanding your global diversification opportunities. With insights from experts across the globe, we offer practical steps for leveraging global markets, reducing tax burdens, and achieving personal freedom through a ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
  continue reading
 
Artwork

1
MoFo Perspectives Podcast

Morrison & Foerster LLP (MoFo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We are Morrison & Foerster. We are MoFo. We are synonymous with a commitment to client service and advisors to market-changing deals and impact litigation. Our clients include some of the largest financial institutions, Fortune 100 companies, and leading technology and life sciences companies. We represent investment funds and startup companies, and over the years have supported their growth and development as leading industry players and household brands.
  continue reading
 
Tony Roth, chief investment officer, Wilmington Trust Investment Advisors, Inc, the investment advisory arm of M&T Bank, asks—and answers—the questions that are top of mind for today’s investors. During each episode, Tony and a special guest provide listeners with insights on unfolding market, economic, and other evolving trends, and a window into how client portfolios are being positioned in the face of ongoing uncertainty.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
  continue reading
 
Artwork

4
Shoveling Smoke

Frantz Ward LLP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shoveling Smoke – A Frantz Ward Lawcast is a podcast series created by Frantz Ward LLP, a full-service law firm in Cleveland, Ohio. Supreme Court Justice Oliver Wendell Holmes said that "lawyers spend a great deal of their time shoveling smoke." One interpretation of his remark is that lawyers take a vague concept or principle and give it shape, clearing away the smoke. Our podcast series focuses on current legal issues and news items that may affect your business, your community or you as a ...
  continue reading
 
Loading …
show series
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.cybersecurity-insiders.com/how-ai-will-shape-the-future-of-cyber-defense-a-one-three-and-five-year-outlook/ https://www.helpnetsecurity.com/2025/10/15/f5-big-ip-data-breach/ https://www.bleepingcomputer.com/news/security/fake-…
  continue reading
 
In this episode, host Jason Kikta talks with Dmitri Alperovitch – CrowdStrike co-founder and chairman of the Automox board – about how speed and precision define modern cyber defense. Alperovitch explores how the OODA loop (Observe–Orient–Decide–Act), a concept rooted in military strategy, can help IT and security teams detect, respond, and adapt t…
  continue reading
 
As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Mike Gallardo for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining them is Alex Guilday, BISO, Royal Caribbean Group. In this episode: Timing the approach When persiste…
  continue reading
 
What if your coffee habit could teach you one of the smartest cybersecurity moves for protecting your money? In this episode of SipCyber, host Jen Lotze takes us on a virtual trip to Nomad Coffee Bar in Enfield, Ireland—a dreamy, pink-hued sanctuary—to deliver a financial security tip that every traveler, parent, and online shopper needs to hear. J…
  continue reading
 
Send us a text In this episode of WTR Small-Cap Spotlight, Tony Scott, Chief Executive Officer, and Kimberly Pinson, Chief Financial Officer, of Intrusion Inc. (NASDAQ: INTZ) join co-hosts James Kisner, Managing Director of Technology Research at Water Tower Research, and Tim Gerdeman, Vice Chair, Co-Founder, and Chief Marketing Officer of Water To…
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this powerful episode, Atif Ghauri, President and COO of UltraViolet Cyber (@uv_cyber), steps into the Hotseat Podcast to discuss how unified offensive and defensive operations are redefining resilience for the modern enterpris…
  continue reading
 
In this episode of the Hands-On IT podcast, Landon Miles interviews Anthony Maxwell, who is a software engineer at Automox. They discuss Anthony's journey from IT operations to software engineering, and his home lab setup. He discusses his favorite projects, the skills he's learned, and how he applies them in his professional life. Anthony also pro…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
TL;DR: On this week's pod - Sean Scranton and Shawn Tuma make a return appearance to talk about Cyber (Security) Insurance. Some see it as the answer to cyber's problems, while others see it as just another question. Which is it? Is it just a matter of perspective? Listen in and find out! YouTube Video: https://youtube.com/live/GiuheFiFO78 Have som…
  continue reading
 
This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline t…
  continue reading
 
In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity …
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
  continue reading
 
This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payme…
  continue reading
 
The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
Watch this episode on YouTube here. For two years, Israel has been fighting a war on multiple fronts. And although it has delivered blows to Iran, Hezbollah, and Hamas on the ground, it’s losing another fight: the information war, a campaign of slander and blood libels fueled by a media empire built by the Muslim Brotherhood. To expose where — from…
  continue reading
 
Send us a text In this episode of Small Cap Spotlight x WTR Healthcare Happenings podcast, WTR's Tim Gerdeman, and Robert Sassoon welcomes back Nick Kadysh, Founding CEO and President of PharmAla Biotech (OTCQB: MDXXF). The discussion explores the evolving global regulatory environment for psychedelics—particularly MDMA—the ripple effects of the Ly…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
  continue reading
 
On this episode of Talos Takes, Hazel welcomes Cisco Duo experts Steven Leung and Tess Mishoe to bust the most common myths around passwordless security and multi-factor authentication (MFA). Discover why not all MFA is created equal, why passwordless doesn't mean less security, and the most seamless way to adopt passwordless solutions. Plus, learn…
  continue reading
 
This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploit…
  continue reading
 
This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
Dr. Jeree Spicer stops through the Cyber Coffee Hour, who masterfully blends cyberpsychology with cybersecurity strategy. From developing robust governance frameworks to her current role as a product manager, Dr. Spicer shows us how to bake security in from the start. Plus, hear about her mission with ReeTheCyberBoss to democratize digital safety e…
  continue reading
 
What if the secret to thriving in cybersecurity and technology advisory wasn’t about knowing it all, but about building authentic relationships and never stopping your learning journey? In this episode of Channel Security Secrets, host Lou Rabon sits down with Anita Patel, CEO and Trusted Technology Advisor at Minerva Tec Group, to explore how genu…
  continue reading
 
This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle …
  continue reading
 
Send us a text On this week's episode of the WTR Small-Cap Spotlight, Jeff Bonar, Chief Executive Officer of privately held CapCO2 Solutions, joined Tim Gerdeman, Vice Chair & Co-Founder and Chief Marketing Officer of Water Tower Research, and Peter Gastreich, Energy and Sustainable Investing Analyst at Water Tower Research to discuss: 1) how CapCO…
  continue reading
 
In this episode of Threat Vector, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠, Vice President of Product Management, and⁠ Krithivasan Mecheri⁠ (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion e…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Re…
  continue reading
 
Send us a text In this episode of WTR Small-Cap Spotlight, host Tim Gerdeman (Vice Chair, Co-Founder & CMO, Water Tower Research) and WTR’s James Kisner speak with Giampaolo Marino, Senior Vice President of Strategy & Business Development at Energous (NASDAQ: WATT), about ambient-IoT wireless power networks, battery-free sensors, and enterprise ado…
  continue reading
 
In this episode, Rob Aragao sits down with futurist Heather Vescent to explore how strategic foresight can be applied to cybersecurity. Heather explains what it means to be a futurist—blending creativity with analytical research—and shares her journey from Silicon Valley to becoming a leader in foresight methodologies. She discusses her early work …
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Automox builds security into the foundation of its products, from engineering practices to company culture. You’ll learn how Automox’s “no security tax” p…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play