Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber News Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Signal over noise. The Ohmbudsman Digest filters global volatility into sharp, voice-driven briefings on geopolitics, digital power, surveillance, climate, and collapse. Each episode distills the day’s tectonic shifts — from AI policy and cyber intrusions to sovereign bets, border tensions, and biofront breakthroughs. No clickbait. No hype. Just high-trust interpretation of a world reshuffling its rules. New episodes: Weekdays, under 5 minutes. Subscribe for context that cuts through the static.
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A BDSM Cyberpunk Audio Drama
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes.This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare.Wha ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading

1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
Cybersecurity Ally is Fortra’s cybersecurity podcast covering security, today’s cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading

1
Children’s Data Stolen from Nursery—Published on Dark Web
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into everything from car factories grinding to a halt to ransomware crews dumping nursery data online. It’s a mix of big-business losses, government experiments with digital ID, and the human cost of attacks that don’t care who they hit. 🚗 Jaguar Land Rover Shutdown – Millions …
…
continue reading

1
🔴 Sep 26’s Top Cyber News NOW! - Ep 971
2:00:36
2:00:36
Play later
Play later
Lists
Like
Liked
2:00:36The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
This is today’s cyber news for September 25, 2025. In this edition we cover major developments that matter to defenders, leaders, and builders. From new malware variants slipping into developer tools, to phishing training that fails in practice, to dangerous flaws in Cisco firewalls already under attack—today’s feed is packed with lessons that dire…
…
continue reading

1
Inside CISA Cuts, ODNI Shifts, and Spyware Threats with Federal News Network's Justin Doubleday
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16What happens when the federal cyber workforce shrinks just as threats are multiplying? In this episode, Federal News Network’s Justin Doubleday joins host Frank Cilluffo to unpack the turbulence facing government agencies. They examine the mass departures at CISA, the controversial firings under DHS’s Cyber Talent Management System, and the looming…
…
continue reading

1
Ready or Not: CMMC 2.0 Final Rule is Here
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Send us a text In this episode, we break down the Department of Defense’s final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to integrate the Cybersecurity Maturity Model Certification (CMMC). We’ll cover what these new contractual obligations mean for contractors, including self-assessment reporting in SPRS, continuo…
…
continue reading

1
Dutch espionage arrest, DOD risk management framework, Oyster malvertising
8:00
8:00
Play later
Play later
Lists
Like
Liked
8:00Dutch teenagers arrested for attempted espionage for Russia DoD announces replacement for risk management framework Fake Microsoft Teams installers deliver Oyster malware Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing.…
…
continue reading
Everyone’s talking about Agentic AI, but beyond the buzz, what’s actually happening on the ground? The mnemonic security podcast is continuing to dive into the world of Agentic AI in our latest episode, recorded live at Sikkerhetsfestivalen. For this episode, Robby is joined by fellow podcaster (CloudFirst Podcast and KI til Kaffen) Marius Sandbu. …
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing (#)
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable…
…
continue reading

1
AI Gone Rogue: Delusional Chats Lead to Heartbreak
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11AI is great for researching topics and digging up information. But what happens when people start to humanize their chatbots, and think they're talking to God? Or that they are God? Let's look at what makes AI come up with delusional theories, and why it tells people they're right even then they're wrong. Resources People Are Losing Loved Ones to A…
…
continue reading

1
EMERGING new RANSOMWARE Gangs. Expert John Hammond.
24:01
24:01
Play later
Play later
Lists
Like
Liked
24:01Legendary Expert John Hammond. Exclusive. Learning How To Hack And Turn It Into A Career with topics: Newest security expert insight, best cybersecurity practices for business, how capture the flag exercises help, and How To Protect Security Of Organizations With Artificial Intelligence. Huntress: https://www.huntress.com/ Send us a text Growth wit…
…
continue reading

1
From Hollywood to Hardware: When AI Stories Come True
17:44
17:44
Play later
Play later
Lists
Like
Liked
17:44Step inside Darnleys Cyber Café for a thought-provoking journey from The Terminator’s Skynet to the eerie futures of Black Mirror. We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality. Click here to send futu…
…
continue reading

1
Joe Carrigan: Build your network. [Security engineer] [Career Notes]
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Please enjoy this encore of Career Notes. Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even wo…
…
continue reading

1
Want to Stay Safe Online? Lie About Your Birthday
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34This story was originally published on HackerNoon at: https://hackernoon.com/want-to-stay-safe-online-lie-about-your-birthday. Your birth date, like your phone number, is personal information that scammers can use to steal your identity or target you for fraud. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. …
…
continue reading

1
How To Bring Social Responsibility To Crypto
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30Tavi Gallego, founder of a new crypto exchange:the Global Investment Crypto Exchange based here in US Midwest joins us. We discuss how to bring social responsibility to crypto. Don't Miss The Video Episode here: https://youtu.be/0xxn7jAdSRw Topics: non profit approaches to crypto currency, benefits of charity through crypto currency, charity throug…
…
continue reading
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a…
…
continue reading

1
Week in Review: Jaguar Land Rover attack, indirect prompt injections, card farms in NYC
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by David Spark with guests Brett Conlon, CISO, American Century Investments, and TC Niedzialkowski, Head of Security & IT, OpenDoor Thanks to our show sponsor, Conveyor Still stuck in security review chaos week after week? You’re not the only one. But with Conveyor…
…
continue reading
CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will p…
…
continue reading

1
Sia Redefines Cloud Security with Supreme Privacy and Impenetrable Protection
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15This story was originally published on HackerNoon at: https://hackernoon.com/sia-redefines-cloud-security-with-supreme-privacy-and-impenetrable-protection. Sia delivers decentralized cloud security with Supreme Privacy and Impenetrable Protection, eliminating single points of failure and insider threats. Check more stories related to cybersecurity …
…
continue reading

1
The Day I Learned My NAS Was Traceable Through TLS Logs
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17This story was originally published on HackerNoon at: https://hackernoon.com/the-day-i-learned-my-nas-was-traceable-through-tls-logs. I recently learned about a new way to leak your privacy, and it's a scary one. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #dns, …
…
continue reading

1
Cyber Defense Radio – Venu Rao – Strobes Security – Hotseat Podcast – 2025
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Venu Rao, CEO & Co-Founder of Strobes Security (@StrobesHQ), steps into the Hotseat Podcast to reveal how their AI-Driven CTEM Platform to minimize threat exposure is transforming how enterprises tackle …
…
continue reading

1
Will Qatar Continue to Mediate Between Hamas and Israel?
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43Qatar often presents itself as a neutral mediator in the world’s trickiest problems, but on Sept. 9, its sovereignty was violated as Israel launched a strike to assassinate top Hamas leaders in Doha. Will Qatar change its strategy? No, explains Majed al-Ansari, the spokesperson of the country’s Foreign Ministry, at a live event with host Ravi Agraw…
…
continue reading
Tech giants say artificial intelligence can outsmart the storm, predicting tomorrow’s weather faster than ever. We talk to Paris Perdikaris of the University of Pennsylvania about a new tension: forecasts are only as good as the public data that fuels them – and now even that is in doubt. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Windows 10 extension, teenage Vegas hacker released, Boyd Gaming hacked
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46Microsoft to offer free Windows 10 security updates in Europe Teenage Vegas casino hacker released to parents Boyd Gaming hacked, employee data stolen Huge thanks to our sponsor, Conveyor Logging into yet another security questionnaire portal on a Friday at 3pm? Yeah, that’s chaos. Conveyor AI is your fast path to calm. It finds every question no m…
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details (#)
5:25
5:25
Play later
Play later
Lists
Like
Liked
5:25SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshel…
…
continue reading

1
NSW schools to get AI tool, AI Charlie Kirk, EU airports hacked and charities get a cyber helping hand
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about NSWEduChat, a virtual Charlie Kirk, the impact of a cyber incident disrupting airports across Europe, and how Australian not-for-profits are getting a new tool to face a rising tide of ransomware attacks. Croft and Hollingworth open proceedings with Instagram…
…
continue reading
Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’…
…
continue reading

1
How to Stop Getting Spam Emails—The Complete Guide to Removing Your Personal Information Online
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51This story was originally published on HackerNoon at: https://hackernoon.com/how-to-stop-getting-spam-emailsthe-complete-guide-to-removing-your-personal-information-online. How to remove your personal information from the major data broker sites and get fewer ads in your inbox. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading

1
How Generative AI Can Be Used in Cybersecurity
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50This story was originally published on HackerNoon at: https://hackernoon.com/how-generative-ai-can-be-used-in-cybersecurity. Explore how generative AI is transforming cybersecurity: its dual-use risks, defense tools, and what teams must do to stay ahead. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can…
…
continue reading

1
🔴 Sep 25’s Top Cyber News NOW! - Ep 970
1:30:35
1:30:35
Play later
Play later
Lists
Like
Liked
1:30:35The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading

1
20. Ransomware Landscape Update: More Groups, More Victims
50:04
50:04
Play later
Play later
Lists
Like
Liked
50:04In this episode of The Dark Dive we check in on the ransomware landscape, following major developments identified by the Searchlight Cyber threat intelligence team. Luke Donovan, Head of Threat Intelligence at Searchlight Cyber, shares trends that his team has identified from the dark web in 2025 including: an escalation in the number of ransomware…
…
continue reading
Daily Cyber News for September 25th, 2025. Today’s episode tracks a rapid-fire landscape where exploits move at disclosure speed and persistence hides below the operating system. We open with a GeoServer flaw weaponized within days against a U.S. federal agency, then shift to new Supermicro BMC issues that enable backdoors that survive wipe-and-reb…
…
continue reading

1
Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale
49:59
49:59
Play later
Play later
Lists
Like
Liked
49:5970% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
…
continue reading

1
Suspect arrested over airport attack, DDoS attack hits new record, BRICKSTORM backdoor steals IPs
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Person arrested in connection with airport attack Record-breaking DDoS attack hits new highs China-linked attackers use ‘BRICKSTORM’ backdoor to steal IP Huge thanks to our sponsor, Conveyor Security reviews don’t have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or an…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support (#)
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send cred…
…
continue reading

1
Shadow AI & Ransomware--Agentic AI EXPOSED
1:00:57
1:00:57
Play later
Play later
Lists
Like
Liked
1:00:57New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks? This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering a…
…
continue reading