Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber News Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
A window into our world, through in-depth storytelling from the BBC. Investigating, reporting and uncovering true stories from everywhere. Award-winning journalism, unheard voices, amazing culture and global issues. From Trump's new world order, to war in Sudan, to the legacy of football icon Mo Salah, The Documentary investigates major global stories. We delve into social media, take you into the minds of the world's most creative people and explore personal approaches to spirituality. Ever ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
A BDSM Cyberpunk Audio Drama
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Cybersecurity Ally is Fortra's cybersecurity podcast covering security, today's cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes.This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare.Wha ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
1
🔴 Oct 31’s Top Cyber News NOW! - Ep 996
1:42:14
1:42:14
Play later
Play later
Lists
Like
Liked
1:42:14The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
1
Weekly Cyber News Rollup, October 31st, 2025
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands…
…
continue reading
Send us a text Even with a government shutdown, the CMMC compliance clock keeps ticking. ⏰🔐 In this episode, we uncover the paradox facing defense contractors: while agencies pause, cybersecurity deadlines don’t. The DoD’s timelines, affirmations, and enforcement plans continue to move forward—leaving unprepared firms at risk when operations resume…
…
continue reading
1
Can You Trust Open AI’s New ChatGPT Atlas Browser?
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18This week on The Awareness Angle, Ant Davis and Luke Pettigrew dive into the fast-moving collision between AI innovation, real-world breaches, and human behaviour. From Sotheby’s data leak to AI browsers that remember your every move, this episode explores where awareness, policy, and technology are all being stress-tested. 🏭 Sotheby’s, Muji & JLR …
…
continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
continue reading
Blood spilled in Sudan's el-Fasher massacre is visible from space. What led to the latest dark turn of events that took place after the Rapid Support Forces seized the city in Northern Darfur from the Sudanese Armed Forces? In this episode, first recorded in 2024, the Global Jigsaw digs into the prehistory of Sudan’s civil war. We focus on the powe…
…
continue reading
1
What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP?
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP? At 17, he left his Caribbean home and came to the US. After initial struggles she landed a job and after inserting his way into a tech issue, the trajectory of his career changed and he now sits as the Chief Field CTO for the Americas at Crowdstrike. Send us a text Growth without Interr…
…
continue reading
1
How Russian AI targets news organisations
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28Networks of bots - automated social media accounts - have been found to be targeting European elections including, in the last year, those in Moldova, Poland and Germany. But could their real intention be to tie up news organisations with fact-checking? Damien Sharkov from BBC Monitoring has been looking at how they operate. Earlier this year, news…
…
continue reading
1
Episode 99: Episode 99 - Quick AISA Melbourne Cybercon 2025 coverage
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04In this episode, Richard briefly gives his thoughts about CyberCon Melbourne 2025.
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
Something unusual happened recently at the Miss USA beauty contest: Miss Nevada, 22-year-old Mary Sickler, walked on stage without any hair. She had lost it to a condition known as alopecia but, until that moment, had worn a wig in public. Tens of millions of women around the world suffer from some form of hair loss and the story has sparked a glob…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
President Trump just returned from a whirlwind week in Asia closing trade and investment deals and strengthening security alliances. Host Cliff May sits down with FDD’s Craig Singleton to discuss what Trump accomplished, as well as the challenges – and threats – that remain.By FDD
…
continue reading
This is today’s cyber news for October 31st, 2025. Today’s brief opens with a polished LinkedIn “board invite” lure stealing Microsoft logins from finance leaders, then shifts to a one-click Chromium crash that can stall kiosks and call floors. We cover hundreds of Android apps abusing near field communication relays, a C I S A deadline to patch a …
…
continue reading
Big Tech’s data centers are changing the landscape of small-town America, bringing new kinds of jobs and economic opportunity. This week, we hear from Shannon Wait, a data technician in South Carolina whose experience led to a rare labor settlement — offering a window into what life inside these facilities is really like. Learn about your ad choice…
…
continue reading
1
LinkedIn AI opt-out, NSA leadership candidates, Python foundation withdraws
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
1
Cyfirma Research- CVE-2025-6541: TP-Link Omada Gateway Remote Command Injection Vulnerability Analysis
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Critical Alert: CVE-2025-6541 – TP-Link Omada Gateway Remote Command Injection Organizations using TP-Link Omada Gateway devices must act immediately. This critical vulnerability allows attackers to execute arbitrary OS-level commands via the device web management interface. Exploitation can lead to full device compromise, exposure of credentials, …
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
1
Why The China Trade Truce Is Unlikely to Last
23:42
23:42
Play later
Play later
Lists
Like
Liked
23:42Dmitri Alperovitch talks with Sarah Stewart, CEO at Silverado and former senior US trade negotiator, about the Trump-Xi meeting in South Korea. They discuss the details of the agreement reached and why it is a temporary trade truce at best. 00:00 Introduction 01:13 US Objectives for the Trump-Xi Meeting 08:43 The Rare Earths Truce 11:29 A Temporary…
…
continue reading
1
OpenAI and mental health, government agencies caught up in hack, and a copyright win for Aussie musos
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, Tasmanian government breach woes, and Australia signing an important UN cyber crime treaty. The pair kick things off with some AI news, including OpenAI opening up about how many of its users talk about their menta…
…
continue reading
51
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
continue reading
***This programme contains references to sexual abuse which some listeners may find upsetting***For decades, Larry Nassar was the doctor for the women’s Olympic Gymnastics team and also treated athletes at Michigan State University. He was the go-to practitioner for sports related injuries but saw many women and girls outside of the sport as well. …
…
continue reading
1
Risky Bulletin: Russia arrests Meduza Stealer group
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Russian police arrest the Meduza-Stealer trio, a Former L-3Harris manager pleads guilty to selling exploits to Russia, the US hacked Venezuela in 2020, and Windows 11 Administrator Protection goes live. Show notes Risky Bulletin: Russia arrests Meduza Stealer group
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
continue reading
1
How should we handle historic public inquiries?
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48When a disaster or serious event happens, such as the Grenfell Tower fire, the Manchester Arena terrorist attack or the Covid pandemic, you can be pretty sure that a public inquiry will follow. They’re popular with the public as a means of investigating serious state failure. And for Governments they can be a good way of kicking a difficult issue i…
…
continue reading
1
Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
Titania Jordan, best-selling author and TV personality (Today Show, GMA etc) and CMO of Bark, joins us to discuss Parenting Today With Social Media. Key Topics: parenting today with social media, social media companies and parenting today, parenting today with tech addiction, holding social media companies accountable today, how social media harms …
…
continue reading
1
🔴 Oct 30’s Top Cyber News NOW! - Ep 995
1:30:09
1:30:09
Play later
Play later
Lists
Like
Liked
1:30:09The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
1
LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
continue reading
This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitatio…
…
continue reading
1
Srsly Risky Biz: Peter Williams, Ex-ASD, Pleads Guilty to Selling Eight Exploits to Russia
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits. They also discuss a new report’s recommendation…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
continue reading