Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Cyber Hacker Podcast
Dive into the thrilling world of the Rogue Ghost Podcast, where treasure hunts and cryptic clues pave the way through the mystical AffinityVerse. Join the enigmatic Enchanter, the Rogue Ghost, and the cunning cyber hacker, Runeweaver, as they race against time to unearth hidden puzzle boxes infused with ancient magic. As the series unfolds, they forge new alliances and confront new enemies while navigating the perilous traps set by the sinister Cerberus Syndicate. This serialized adventure i ...
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
True crime meets cybercrime. Discover the people behind the keyboard. From Ransomware-as-a-Service (RaaS) gangs to global financial crime syndicates, the rise of sophisticated cyber threats is reshaping the world. These aren’t lone hackers — they’re organized groups running multi-million dollar operations in the shadows. In the Masked Actors podcast, cyber threat expert and former soldier turned hacker Gary Ruddell joins forces with Nick Palmer, a seasoned financial crime fighter, to investi ...
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A new beginning in IT
…
continue reading
This podcast is an interview series with career professionals in cyber security as we get their takes on shadow IT, extended access control, agentic AI and how they arrived at this point in their careers.
…
continue reading
A short and to the point podcast about hacking and cyber security. A weekly podcast that give you best information and knowledge about cyber security. And helps you to save your time. Support this podcast: https://podcasters.spotify.com/pod/show/hacker-life/support
…
continue reading
We cover business-related topics and stories to help you grow your business to new heights and cover the latest cybersecurity news so you can know what’s coming!
…
continue reading
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Hosted by Niles Benghauser of CTO Security, this podcast covers a wide range of developments in the world of cybersecurity and managed information technology (IT).
…
continue reading
Podcast by Neat
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
…
continue reading
A podcast where members of the Hackmethod team talk about a day in the life as cyber security researchers. Topics include current hacker projects, technology trip ups and impulse game playing.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading

1
CYBER UNCUT: OpenAI under fire, WSU cyber attack update, and letters of marque for hackers
42:53
42:53
Play later
Play later
Lists
Like
Liked
42:53In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss a pair of lawsuits targeting ChatGPT’s maker, cyber crime news, and one US politician’s novel solution to combat hackers. Hollingworth and Croft kick things off by addressing a pair of lawsuits targeting OpenAI and the tragic case of a teenager who was allegedly…
…
continue reading

1
Watchman Privacy Podcast: Guests and Credibility Analysis.
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23This episode covers the The Watchman Privacy podcast, hosted by Gabriel Custodiet, focusing on its mission to help listeners understand and escape the "Technocracy". It examines Custodiet's background in cybersecurity and finance, which underpins the podcast's credibility and consistent editorial focus. A significant portion of the report details t…
…
continue reading

1
Auchan Retailer Data Breach, Nevada State Offices Halt Services After Major Cyber Incident, South Korea Arrests Hacker Accused of Targeting BTS, Maryland Cyberattack Disrupts Transit Services
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03🎙️ Auchan Retailer Breach Hits 100K+, Nevada State Offices Down, BTS Hacker Arrested 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 968: Today's episode will discuss the latest news as Auchan Retailer Breach Hits 100K+ with more news below: · Organizations Warned of Exploited Git V…
…
continue reading

1
Episode 467 - Configuration compromise leads to 90 bounties - Hack the Hacker Series
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44We speak with Ethical Hacker Juan Francisco 'Fran' Bolivar and Sajeeb Lohani, Global TISO for Bugcrowd. Fran successfully claimed 90 bounties as a result of a ServiceNow configuration compromise, with bounties ranging between $100K and $3K. Fran provides insight into his methodologies, learning outcomes and the challenges of being an ethical hacker…
…
continue reading

1
Grok Chatbot Leaks 370,000 Private Conversations
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56This week on The Awareness Angle, Anthony Davis and Luke Pettigrew come together for a special in-person episode while filming new Cybersecurity Awareness Month videos. From exposed AI chats to insider sabotage, telecom breaches, and Denmark’s bold new deepfake law, the conversation digs into how human behaviour, weak controls, and patchy regulatio…
…
continue reading

1
Breaking the Sky: How Vulnerable Are Our Satellites?
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows …
…
continue reading

1
Digital Justice in Uruguay: Hill's Case and the Anthem of Resistance.
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46This comprehensive analysis examines the evolving fight for justice in the digital age, drawing parallels between historical struggles against oppression and contemporary challenges posed by technology. It highlights Alberto Daniel Hill's case as a prime example of a "digital prisoner," an expert in cybersecurity unjustly incarcerated due to a tech…
…
continue reading

1
The Homeland or the Digital Tomb: Alberto Daniel Hill, the Political Prisoner and the National Anthem as a Manifesto for Justice in the Age of Surveillance.
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01The struggle for justice in the digital age is not a new phenomenon, but the continuation of a historic battle for freedom and human dignity against the changing forms of oppressive power. To understand the nature of this new conflict, it is necessary to draw a bridge between the struggles of the past and the challenges of the present. This report …
…
continue reading

1
Electoral Censorship and Freedom of Expression in Mexico.
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51A censorship case in Mexico related to a tweet by journalist Álvaro Delgado Gómez about the marriage of a Supreme Court candidate, Magda Zulema Mosri Gutiérrez, and her alleged link to a former prosecutor. "
…
continue reading

1
Censura Electoral y Libertad de Expresión en México – El Caso Delgado vs. INE.
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02Reporte Especial: Censura Electoral y Libertad de Expresión en México – El Caso Delgado vs. INEAmigos y oyentes, el epicentro de nuestra discusión de hoy es un incidente que tuvo lugar en mayo de 2025 en México. El periodista Álvaro Delgado Gómez publicó un tuit el 24 de mayo de 2025, denunciando una orden del Instituto Nacional Electoral (INE) par…
…
continue reading
Alberto's poignant statement, "The judge and prosecutor hardly know what an IP address was," reveals a profound and dangerous disconnect. It shows a justice system operating in the dark, unable to comprehend the very world it is meant to govern. In his case, the battle wasn't against malice but against a staggering ignorance that turned his experti…
…
continue reading

1
Alberto Daniel Hill: Justicia y Transparencia Radical.
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08Alberto Daniel Hill desafió la injusticia de múltiples maneras, transformando su experiencia personal de persecución en una plataforma para la reforma y la educación. Su lucha abarcó tanto la resistencia personal como la defensa activa de un sistema más justo y conocedor.Aquí se detalla cómo Hill desafió la injusticia:• Resistencia personal y legal…
…
continue reading

1
Liberen a Vlady: Ciberseguridad y derecho en Uruguay.
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Las fuentes presentan discusiones con un hacker llamado Gob.eth y otros participantes con respecto al arresto y encarcelamiento de un asociado de 18 años, Vlady , en Uruguay. Gob.eth afirma que Vlady está acusado erróneamente de múltiples delitos de piratería informática, alegando que sus acciones fueron principalmente desfiguraciones de sitios web…
…
continue reading

1
El panorama de la ciberseguridad en Uruguay: un análisis experto.
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Los textos proporcionados ofrecen un examen multifacético del panorama de la ciberseguridad de Uruguay, destacando tanto sus ambiciones digitales como sus vulnerabilidades significativas. Una narrativa central se centra en Alberto Daniel Hill, un hacker ético que fue encarcelado injustamente, convirtiéndose en un ejemplo conmovedor de la desconexió…
…
continue reading

1
Dexer's Anonymous: A Hacktivist's Atonement.
28:54
28:54
Play later
Play later
Lists
Like
Liked
28:54Alberto Daniel Hill introduces and reflects on a publication titled "My Life in Anonymous: An Atonement" by a former hacktivist known as Dexer. The discussion traces Dexer's decade-long journey from an observer to an active member of Anonymous, detailing his group's efforts to legitimize themselves in information security. It highlights the movemen…
…
continue reading

1
Versión en español: Misterios Cibernéticos Mexicanos: De Grinberg a los Hackeos del Cartel
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04Los textos proporcionados describen el podcast Cyber Midnight Club, presentado por el experto uruguayo en ciberseguridad Alberto Daniel Hill, que explora temas como la piratería, el cibercrimen y la privacidad digital, a menudo con eventos del mundo real y su defensa de la justicia. Una parte significativa del contenido del podcast se centra en el …
…
continue reading

1
Mexican Cyber Mysteries: From Grinberg to Cartel Hacks
42:44
42:44
Play later
Play later
Lists
Like
Liked
42:44This briefing synthesizes information from "Cyber Midnight Club: Mexico's Digital Underbelly" and "Héctor López & Alberto Daniel Hill: Cybersecurity Collaboration" with the podcast "Jacobo Grinberg, El PENTAGONO Y CHINA; Hacker EXPONE VERDADES — Héctor López." It provides a detailed overview of the key themes, prominent figures, and critical insigh…
…
continue reading

1
Uruguay's Cybersecurity Landscape: An Expert Analysis.
52:16
52:16
Play later
Play later
Lists
Like
Liked
52:16As your thought partner, I can help you quickly understand and analyze the provided information to formulate strategic recommendations for senior leadership. I will provide clear, concise, and well-supported answers, drawing on the details in the sources. The knowledge base you've provided includes extensive insights into Uruguay's cybersecurity la…
…
continue reading

1
First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12🎙️ First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 970: Today's episode will discuss the latest news as First AI-Weaponized Supply Chain Attack with more news below: · ShadowSilk Hits 36 Govern…
…
continue reading

1
Episode 137: How We Do AI-Assisted Whitebox Review, New CSPT Gadgets, and Tools from SLCyber
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback he…
…
continue reading

1
Turning AI Into Your Super Tool with Ron Eddings
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52AI is neither friend nor foe, it’s both. The way we choose to use it determines whether it helps or harms. In this solo episode, Ron Eddings shares lessons from his first job at a grocery store, his early days in cybersecurity, and today’s AI-driven landscape. From productivity hacks like meeting transcription, to creative tools like content-aware …
…
continue reading

1
S3 EP06 Rethinking Risk: A Framework for Businesses Below the Poverty Line
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22Discover how we can assist you in identifying and closing gaps in your IT strategy to help keep your business safe, scalable, and secure. https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode, Scott Kreisberg and CISSP Tim Derrickson break down: Why many SMBs remain below the poverty line—even after buying e…
…
continue reading

1
Veterans, leadership and returning home, with former commando Heston Russell
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17In this episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by Heston Russell – a public speaker, author and former Australian Special Forces officer – to discuss the 2025 Veteran Games and the recent regional heat held in Darwin on 22 August and later this year on the Gold Coast (11 and 12 October). Russell has pre…
…
continue reading

1
First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03🎙️ First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 969: Today's episode will discuss the latest news as First AI-Powered Ransomware Found with more news below: · Japan, US, South Korea Forum Addresse…
…
continue reading

51
The Global Cyber Threat Landscape 2024-2025.
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31The provided report offers an extensive overview of the global cyber threat landscape for 2024-2025, emphasizing the professionalization of cybercrime and its increasing entanglement with geopolitical motives. It highlights the rise of Ransomware-as-a-Service (RaaS) models and the evolution of multi-extortion tactics, which have significantly impac…
…
continue reading

1
How a Cyber Attack Paralyzed a City - Ep 164
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target. Follow or subscribe to the show on your preferred podcast platform. …
…
continue reading

1
DEFENCE PROPERTY PODCAST: From DHOAS to rentvesting – unlocking smarter strategies for Defence investors
49:38
49:38
Play later
Play later
Lists
Like
Liked
49:38In this episode of the Defence Property Podcast, Kane Dury from Discover Buyers Agency and Liam Garman, editor of Smart Property Investment, tackle the property questions that Australian Defence Force members can’t afford to ignore. They explore how the Reserve Bank of Australia’s latest rate cut could impact borrowing capacity and why understandin…
…
continue reading

1
A Reunion After 18 Months: Cybersecurity and Human Connections on TWITTER SPACES.
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47The provided sources offer a multifaceted conversation exploring challenges in the digital age, particularly concerning online platforms and free speech. They highlight personal struggles and emotional reunions among friends, alongside the pervasive influence of Artificial Intelligence in both its beneficial and harmful applications. A significant …
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
RansomHub: From RaaS Kingpin to Cartel Mystery
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05When RansomHub, one of the most prolific ransomware groups, vanished overnight back in April, it sent shockwaves through the cybercriminal underworld. With over 600 global attacks and millions extorted, their sudden disappearance left affiliates scrambling and researchers asking: what happened? Join Group-IB’s Gary Ruddell and Nick Palmer as they s…
…
continue reading

1
Bridging Worlds: The Evolving Landscape of IoT Security and Regulation
32:32
32:32
Play later
Play later
Lists
Like
Liked
32:32Aseem Jakhar, Cybersecurity Entrepreneur, Technologist, and Founder of EXPLIoT, joins Phillip Wylie to address the current state and evolution of IoT and hardware security, examining why security has lagged in this sector compared to other technological advances. By exploring regulatory changes, practical security considerations for both researcher…
…
continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
…
continue reading

1
Is AI Going Too Fast for Our Own Good? What Ethics Say About It!
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23Join us on this mind-blowing episode of the Smarter Online Safety Podcast featuring Beth Rudden, CEO & Chairwoman of Bast.AI, IBM Distinguished Engineer, and a trailblazer in AI ethics and cybersecurity! With 20+ years of experience, Beth unveils how AI, ethics, and cybersecurity intersect in today's rapidly evolving digital landscape. In this epis…
…
continue reading

151
Narco-Influencers: Mexico's Corrupted Landscape.
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Estos materiales exploran la creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se manifiesta a través de los "narcoinfluencers". Los textos describen cómo los cárteles han evolucionado desde la propaganda tradicional de los narcocorridos hasta el marketing digital sofisticado en redes sociales como TikTok, utilizand…
…
continue reading

1
ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33La creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se extiende desde los tradicionales narcocorridos hasta las sofisticadas estrategias en redes sociales. El texto detalla cómo los cárteles utilizan plataformas como TikTok para glamorizar estilos de vida criminales, reclutar nuevos miembros y ejercer control a tra…
…
continue reading

1
Chasing Entropy Podcast 018: From Game Genie to Global Security. A Conversation with Rob Fuller
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09In this episode of the Chasing Entropy Podcast, host Dave Lewis, Global Advisory CISO at 1Password, sits down with Rob Fuller (a.k.a. Mubix), cybersecurity leader, Marine Corps veteran, red teamer, and technical advisor—to explore the twists, turns, and lessons from a career built at the intersection of curiosity, community, and defense. Early Spar…
…
continue reading

1
Episode 214: DEF CON Redux with Rachel Tobac!
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adcho…
…
continue reading

1
ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10Este informe analiza extensas violaciones de datos que afectan a las entidades gubernamentales uruguayas, revelando una disparidad significativa entre la reputación de liderazgo digital de la nación y sus capacidades reales de ciberseguridad. Destaca la venta de millones de registros confidenciales, incluidos 30,000 certificados de infraestructura …
…
continue reading

1
SPOTLIGHT: Defence industry testing and evaluation, with Harry Hickling
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04In this episode of the Defence Connect Spotlight podcast, senior journalist Robert Dougherty sits down with Harry Hickling, managing director at APV Corporation, to discuss the importance of rigorous testing and evaluation in the evolving landscape of defence and automotive industries. Hickling takes listeners behind the scenes, sharing how the com…
…
continue reading

1
From Gatekeeper to Growth Partner: How Modern CISOs Build Trust, Drive Innovation, and Shape AI-Enabled Business Security | A Conversation with Legendary CISO, Andy Ellis | Redefining CyberSecurity with ...
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
…
continue reading

1
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
1:01:27
1:01:27
Play later
Play later
Lists
Like
Liked
1:01:27Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth…
…
continue reading

1
Uruguay's Digital Breach: A Crisis of Trust and Security
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30This report analyzes extensive data breaches affecting Uruguayan government entities, revealing a significant disparity between the nation's reputation for digital leadership and its actual cybersecurity capabilities. It highlights the sale of millions of sensitive records, including 30,000 National ID Public Key Infrastructure (PKI) certificates w…
…
continue reading

1
X Corp.'s Content Moderation Practices and Challenges.
47:23
47:23
Play later
Play later
Lists
Like
Liked
47:23This research offers an expert analysis of X's (formerly Twitter's) account suspension and moderation practices, highlighting a significant disconnect between its stated commitment to "free speech" and the platform's often opaque and inconsistent enforcement of rules. It outlines how automated systems primarily handle suspensions, which are effecti…
…
continue reading

1
Farmers Insurance Data Breach, Large Interpol Cybercrime Crackdown in Africa Leads to Arrest of Over 1,200 Suspects, Colt Confirms Customer Data Stolen, DataIO Hit by Ransomware Attack
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17🎙️ Farmers Insurance 1M+ Breach, Interpol Arrests 1,200+, Colt Data Auctioned, Censorship Battle 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 967: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below: · Tech Companies Face FTC Scrutiny …
…
continue reading
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
…
continue reading

1
Episode 470 - The Risks and Rewards of Agentic AI
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41As we enter the era of agentic AI, we must also address its risks. At Zenith Live 2025, we speak with Ed Henry, Zscaler, Senior Data Scientist and discuss agentic AI, its potential to streamline operations, and what are some of the key security challenges. #ZL2025 #zerotrustsecurity #mysecuritytv #zscaler…
…
continue reading
We speak with Phil Tee, Zscaler, EVP, Head of AI Innovations at Zenith Live 2025 in Las Vegas. Phil and his team are developing new AI advancements to better secure the use of AI, enabling organizations to integrate and leverage its potential. Phil is responsible for driving AI innovations at Zscaler, leveraging their unique data assets and the lat…
…
continue reading