The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Cyber Defense Podcasts
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
A "real clear" discussion of contemporary issues in defense featuring the writers and editors of RealClear Defense.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Taking the cannel to new levels giving short insights to geopolitical issues around the world that everyone should be aware of. Philip INGRAM MBE, is a former senior British Military Intelligence officer and now presenter, presenters friend and commentator on Times Radio, Talk, Sky News, the BBC and many other global channels
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
WTR Small-Cap Spotlight is your weekly guide to uncovering hidden value in the world of small-cap stocks. Each episode features insightful interviews with C-level executives, industry thought leaders, and Water Tower’s expert analysts. Tune in for actionable investment ideas and in-depth discussions on under-the-radar opportunities that can make a big impact on your portfolio
…
continue reading
Worldwise Wealth is a podcast designed for global-minded entrepreneurs and investors eager to build borderless lives. Each episode dives into strategies for international diversification, including second residencies and citizenships, unlocking new financial landscapes, and understanding your global diversification opportunities. With insights from experts across the globe, we offer practical steps for leveraging global markets, reducing tax burdens, and achieving personal freedom through a ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
We are Morrison & Foerster. We are MoFo. We are synonymous with a commitment to client service and advisors to market-changing deals and impact litigation. Our clients include some of the largest financial institutions, Fortune 100 companies, and leading technology and life sciences companies. We represent investment funds and startup companies, and over the years have supported their growth and development as leading industry players and household brands.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
Tony Roth, chief investment officer, Wilmington Trust Investment Advisors, Inc, the investment advisory arm of M&T Bank, asks—and answers—the questions that are top of mind for today’s investors. During each episode, Tony and a special guest provide listeners with insights on unfolding market, economic, and other evolving trends, and a window into how client portfolios are being positioned in the face of ongoing uncertainty.
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
Shoveling Smoke – A Frantz Ward Lawcast is a podcast series created by Frantz Ward LLP, a full-service law firm in Cleveland, Ohio. Supreme Court Justice Oliver Wendell Holmes said that "lawyers spend a great deal of their time shoveling smoke." One interpretation of his remark is that lawyers take a vague concept or principle and give it shape, clearing away the smoke. Our podcast series focuses on current legal issues and news items that may affect your business, your community or you as a ...
…
continue reading
1
Defensive Security Podcast Episode 327
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.cybersecurity-insiders.com/how-ai-will-shape-the-future-of-cyber-defense-a-one-three-and-five-year-outlook/ https://www.helpnetsecurity.com/2025/10/15/f5-big-ip-data-breach/ https://www.bleepingcomputer.com/news/security/fake-…
…
continue reading
1
CISO IT – Dmitri Alperovitch’s Vision for Cyber Defense, E07
22:31
22:31
Play later
Play later
Lists
Like
Liked
22:31In this episode, host Jason Kikta talks with Dmitri Alperovitch – CrowdStrike co-founder and chairman of the Automox board – about how speed and precision define modern cyber defense. Alperovitch explores how the OODA loop (Observe–Orient–Decide–Act), a concept rooted in military strategy, can help IT and security teams detect, respond, and adapt t…
…
continue reading
1
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how…
…
continue reading
1
Sales Follow Up Sequences: What Works Best in Cyber?
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26All links and images can be found on CISO Series. Check out this post by Mike Gallardo for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining them is Alex Guilday, BISO, Royal Caribbean Group. In this episode: Timing the approach When persiste…
…
continue reading
1
Credit Cards vs Debit: Your First Line of Cyber Defense
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22What if your coffee habit could teach you one of the smartest cybersecurity moves for protecting your money? In this episode of SipCyber, host Jen Lotze takes us on a virtual trip to Nomad Coffee Bar in Enfield, Ireland—a dreamy, pink-hued sanctuary—to deliver a financial security tip that every traveler, parent, and online shopper needs to hear. J…
…
continue reading
1
Inside Intrusion (INTZ): How Reputation-Based Cyber Defense Is Powering Sustainable Growth
39:17
39:17
Play later
Play later
Lists
Like
Liked
39:17Send us a text In this episode of WTR Small-Cap Spotlight, Tony Scott, Chief Executive Officer, and Kimberly Pinson, Chief Financial Officer, of Intrusion Inc. (NASDAQ: INTZ) join co-hosts James Kisner, Managing Director of Technology Research at Water Tower Research, and Tim Gerdeman, Vice Chair, Co-Founder, and Chief Marketing Officer of Water To…
…
continue reading
1
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
…
continue reading
1
Guard Duty: A Conversation on Cyber Defense and Digital Resilience
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39LBMC's Mark Burnette and Bill Dean talk about some of the most common technical security issues that are discovered in penetration testing, as well as some tactics for improving cyber defenses.
…
continue reading
1
From Targets to Tacticians: The Future of Cyber Defense - Ep 170
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38By Reimagining Cyber
…
continue reading
1
Cyber Defense Radio – Atif Ghauri - President and COO - UltraViolet Cyber – Hotseat Podcast – 2025
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this powerful episode, Atif Ghauri, President and COO of UltraViolet Cyber (@uv_cyber), steps into the Hotseat Podcast to discuss how unified offensive and defensive operations are redefining resilience for the modern enterpris…
…
continue reading
1
Hands-On IT – Virtualization, IT Support, and... Home Labs? How Automox Techies Use Automox, E07
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13In this episode of the Hands-On IT podcast, Landon Miles interviews Anthony Maxwell, who is a software engineer at Automox. They discuss Anthony's journey from IT operations to software engineering, and his home lab setup. He discusses his favorite projects, the skills he's learned, and how he applies them in his professional life. Anthony also pro…
…
continue reading
1
How IPinfo Turns Registry Data into Real Intelligence
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
DtSR Episode 677 - Is Cyber Insurance the Answer or A Question
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25TL;DR: On this week's pod - Sean Scranton and Shawn Tuma make a return appearance to talk about Cyber (Security) Insurance. Some see it as the answer to cyber's problems, while others see it as just another question. Which is it? Is it just a matter of perspective? Listen in and find out! YouTube Video: https://youtube.com/live/GiuheFiFO78 Have som…
…
continue reading
This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline t…
…
continue reading
1
Identity-based Cyber: Jasson Casey on Beyond Identity and the Future of Cybersecurity
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity …
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
continue reading
1
How to Protect Your Kids Online When They're Playing Video Games
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
…
continue reading
1
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
…
continue reading
This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payme…
…
continue reading
1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
continue reading
Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Introduction CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading
1
CMMC Compliance: GRC, PreVeil, and MSSP Synergy
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Introduction CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading
1
Security That Moves at Dev Speed: Practical Ways to Shift Left
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
Mariam Wahba on the Muslim Brotherhood’s Media Empire
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08Watch this episode on YouTube here. For two years, Israel has been fighting a war on multiple fronts. And although it has delivered blows to Iran, Hezbollah, and Hamas on the ground, it’s losing another fight: the information war, a campaign of slander and blood libels fueled by a media empire built by the Muslim Brotherhood. To expose where — from…
…
continue reading
1
PharmAla Biotech’s CEO Nick Kadysh On Psychedelics, the FDA, and PharmAla’s Strategic Approach Post-Lykos CRL
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Send us a text In this episode of Small Cap Spotlight x WTR Healthcare Happenings podcast, WTR's Tim Gerdeman, and Robert Sassoon welcomes back Nick Kadysh, Founding CEO and President of PharmAla Biotech (OTCQB: MDXXF). The discussion explores the evolving global regulatory environment for psychedelics—particularly MDMA—the ripple effects of the Ly…
…
continue reading
1
AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonate AI Browser Sidebar
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
…
continue reading
1
Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
…
continue reading
1
Passwordless Security: Debunking the Biggest Myths
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08On this episode of Talos Takes, Hazel welcomes Cisco Duo experts Steven Leung and Tess Mishoe to bust the most common myths around passwordless security and multi-factor authentication (MFA). Discover why not all MFA is created equal, why passwordless doesn't mean less security, and the most seamless way to adopt passwordless solutions. Plus, learn…
…
continue reading
1
Weekly Cyber News Rollup, October 24th, 2025
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploit…
…
continue reading
This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
continue reading
1
Cyberpsychology, Product Security, and Governance | Dr. Jeree Spicer
1:25:53
1:25:53
Play later
Play later
Lists
Like
Liked
1:25:53Dr. Jeree Spicer stops through the Cyber Coffee Hour, who masterfully blends cyberpsychology with cybersecurity strategy. From developing robust governance frameworks to her current role as a product manager, Dr. Spicer shows us how to bake security in from the start. Plus, hear about her mission with ReeTheCyberBoss to democratize digital safety e…
…
continue reading
1
Harnessing Channel Insights - Anita Patel - Channel Security Secrets - Episode #13
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48What if the secret to thriving in cybersecurity and technology advisory wasn’t about knowing it all, but about building authentic relationships and never stopping your learning journey? In this episode of Channel Security Secrets, host Lou Rabon sits down with Anita Patel, CEO and Trusted Technology Advisor at Minerva Tec Group, to explore how genu…
…
continue reading
This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle …
…
continue reading
1
CapCO2 Solutions CEO on What Makes Green Methanol a Game-Changer for Midwest Ethanol and its Role in Supporting SAF
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Send us a text On this week's episode of the WTR Small-Cap Spotlight, Jeff Bonar, Chief Executive Officer of privately held CapCO2 Solutions, joined Tim Gerdeman, Vice Chair & Co-Founder and Chief Marketing Officer of Water Tower Research, and Peter Gastreich, Energy and Sustainable Investing Analyst at Water Tower Research to discuss: 1) how CapCO…
…
continue reading
In this episode of Threat Vector, David Moulton speaks with two cybersecurity leaders from Palo Alto Networks: Sarit Tager, Vice President of Product Management, and Krithivasan Mecheri (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion e…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
continue reading
This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Re…
…
continue reading
1
Energous (WATT) - From Cables to Power-Over-the-Air: Building Wireless Power Networks for Ambient IoT
14:06
14:06
Play later
Play later
Lists
Like
Liked
14:06Send us a text In this episode of WTR Small-Cap Spotlight, host Tim Gerdeman (Vice Chair, Co-Founder & CMO, Water Tower Research) and WTR’s James Kisner speak with Giampaolo Marino, Senior Vice President of Strategy & Business Development at Energous (NASDAQ: WATT), about ambient-IoT wireless power networks, battery-free sensors, and enterprise ado…
…
continue reading
In this episode, Rob Aragao sits down with futurist Heather Vescent to explore how strategic foresight can be applied to cybersecurity. Heather explains what it means to be a futurist—blending creativity with analytical research—and shares her journey from Silicon Valley to becoming a leader in foresight methodologies. She discusses her early work …
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln;
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
…
continue reading
1
Product Talk – Secure by Default: Inside Automox’s Approach to Product Security, E21
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Automox builds security into the foundation of its products, from engineering practices to company culture. You’ll learn how Automox’s “no security tax” p…
…
continue reading