Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Risk Reporting Podcasts

show episodes
 
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
The Bare Metal Cyber CRISC Audio Course is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
  continue reading
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
Artwork

1
Conscious Governance

Conscious Governance that helps Boards & CEOs make the choices that create the future for the communities they serve

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Conscious Governance is an advisory service that helps Boards & CEOs make the choices that create the future for the communities they serve. We do this by creating clarity from complexity in governance, strategy, risk and leadership.
  continue reading
 
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the Donald Trump administration, DOGE, Tesla, insurance costs, recession risks, egg shortages, DeepSeek, neo-Nazis, Putin and Xi, solar batteries, the jobs market, anti-Semitism, a ...
  continue reading
 
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
  continue reading
 
Artwork

1
AcoraCast

Acora Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to AcoraCast - The forefront of expertise and innovation, with the freshest IT, cyber security and AI insights brought to you by Acora. Tune in as we unravel the latest trends, tips, and tools, all tailored to empower you in your role as an IT or Security Trailblazer. Interested in seeing what else Acora can do? Visit our website.
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork

4
Data Privacy Detective

Joe Dehner - Global Data Privacy Lawyer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet in its blooming evolution makes personal data big business – for government, the private sector and denizens of the dark alike. The Data Privacy Detective explores how governments balance the interests of personal privacy with competing needs for public security, public health and other communal goods. It scans the globe for champions, villains, protectors and invaders of personal privacy and for the tools and technology used by individuals, business and government in the great ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
“From The Blockchain" brings you today’s most innovative entrepreneurs and thought leaders to unpack the true potential of smart contract technology, web3, and the digital frontier! Host Ashley Smith is thrilled to have you join today’s top tier community of forward thinking trailblazers. This show brings substance over hype - say goodbye to the noise of NFT and cryptocurrency market speculation. Instead, From The Blockchain aims foster a culture of idea sharing, creativity, and innovation t ...
  continue reading
 
Loading …
show series
 
The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
  continue reading
 
A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
  continue reading
 
Fitness app Ladder is debuting a new nutrition tracking feature that lets you snap a photo to input macros. Also, according to a new report from Bloomberg’s Mark Gurman, Apple Maps users could start seeing ads in the app as soon as next year. Similar to Google Maps and other mapping apps, Apple’s plan is to allow restaurants and other businesses wi…
  continue reading
 
A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
  continue reading
 
The launch of Perplexity’s Comet AI browser — a major step forward in AI-assisted browsing — was almost immediately hijacked by cybercriminals. Within weeks of its July debut, threat intelligence firm BforeAI uncovered a coordinated impersonation campaign designed to exploit public interest in the new product. The campaign involved a web of fraudul…
  continue reading
 
Donald Trump is on the move and throwing his weight around in Asia. But will the US president have the upper hand when he sits down with Chinese President Xi Jinping later this week? He wants to do a deal on everything from trade to nuclear weapons and he isn't too concerned about China's plans for Taiwan. Today, ABC global affairs editor Laura Tin…
  continue reading
 
A new wave of cyber-espionage attacks reveals North Korea’s deepening effort to steal critical defense technologies from Europe. In a sophisticated campaign dubbed Operation Dream Job, the Lazarus Group — also known as Diamond Sleet and Hidden Cobra — has launched targeted attacks on European defense contractors and UAV (unmanned aerial vehicle) de…
  continue reading
 
-The United States and China are ready to move forward on a TikTok deal, according to Treasury Secretary Scott Bessent. -A high school student in Baltimore County, Maryland was reportedly handcuffed and searched after an AI security system flagged his bag of chips as a possible firearm. -OpenAI is working on a new tool that would generate music bas…
  continue reading
 
Warning: This story contains distressing themes including discussion of child sexual abuse. ABC journalist Adele Ferguson has spent months investigating Australia’s childcare industry and her findings are devastating. She’s exposed a broken system, where profit so often comes before the safety of children and where the most vulnerable are abused an…
  continue reading
 
Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and…
  continue reading
 
A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code sim…
  continue reading
 
Ford is prioritizing its gas and hybrid F-150 trucks instead. Plus, Trump's $250 million White House ballroom will be funded in part by big tech companies like Amazon, Apple, Google, Meta, and Microsoft. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
  continue reading
 
The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilit…
  continue reading
 
A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing em…
  continue reading
 
Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like Ch…
  continue reading
 
Rudy Arora and Sarthak Dhawan, two 20-year-old college dropouts, grew an AI note-taker app to five million users and an eight-figure ARR. Also, The milestone marks a new record for the platform, as YouTube’s annual music industry payout increased by $2 billion since 2022. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
In today’s digital battlefield, prevention is no longer enough. Firewalls and endpoint protection might keep the doors locked, but attackers are slipping in through the windows. In this episode of Tech Talks Daily, I sit down with Brian Dye, CEO of Corelight, to explore how the cybersecurity game has changed and why network detection and response (…
  continue reading
 
Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryptio…
  continue reading
 
The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned th…
  continue reading
 
San Francisco-based Keycard has officially emerged from stealth mode, announcing $38 million in funding across seed and Series A rounds to build what may become one of the most critical infrastructure layers of the AI era — identity and access management (IAM) for AI agents. Founded in 2025 by former senior executives from Snyk and Okta, Keycard is…
  continue reading
 
Security researchers are urging immediate action after TP-Link disclosed multiple critical vulnerabilities in its Omada gateway line, affecting a wide range of ER, G, and FR series devices. The flaws—now patched by TP-Link—expose organizations to remote code execution, privilege escalation, and full network compromise, making them among the most se…
  continue reading
 
Ahead of his election Donald Trump promised to deport millions of undocumented immigrants. The surge by Immigration and Customs Enforcement (ICE) in cities like Chicago has seen people plucked off the street, pending deportation, with agents even targeting churches and schools. Today, Caitlin Dickerson, staff writer at The Atlantic, on how the pres…
  continue reading
 
A critical new vulnerability known as TARmageddon (CVE-2025-62518) has sent shockwaves through the Rust developer community and the broader cybersecurity world. This high-severity desynchronization flaw, discovered in the Async-tar and Tokio-tar libraries, exposes millions of downstream applications to the risk of remote code execution and supply c…
  continue reading
 
The founders of machine learning community Kaggle are trying to upend the crowded sales prospecting market with AI. And they're making headway. Also, Starbridge raises $42M Series A led by Craft Ventures to help businesses better monitor public service opportunities. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechan…
  continue reading
 
Dataminr, the AI powerhouse known for its real-time risk and event detection platform, has announced plans to acquire ThreatConnect, a cybersecurity firm specializing in threat intelligence aggregation and response, for $290 million in cash and equity. This strategic move marks a major milestone in the ongoing consolidation of the threat intelligen…
  continue reading
 
The company is also improving search by suggesting properties that you might have missed due to your filters and has redesigned the Maps view to let you search for points of interest such as nearby landmarks, attractions, and restaurants. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring tog…
  continue reading
 
California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically de…
  continue reading
 
He’s decided he won’t call himself a duke anymore, but Prince Andrew is still a prince, living in a 30 bedroom mansion on the grounds of Windsor Castle. So, when, if ever, will he be held accountable for his association with the sex offender Jeffrey Epstein and his alleged abuse of Virginia Giuffre, whose harrowing memoir has been released this wee…
  continue reading
 
In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materi…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play