Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Presented by Sky News' security and defence editor, Deborah Haynes.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading

1
Pandas with a purpose. [Research Saturday]
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They al…
…
continue reading

1
From English Literature to Cybersecurity: A Journey Through Blockchain and Security
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36LINKS: https://distrust.co/ - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability: https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Levi from Distrust. Anton shares his unique career transition from obtaining a…
…
continue reading

1
Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest George Finney, CISO, The University of Texas System – check out George’s new book plus all his other achievements at his website, WellAwareSecurity. Thanks to our show sponsor, Conveyor Still spending hours maintaining a massive sprea…
…
continue reading

1
Is Trump’s Middle East Policy a Break From the Past?
43:44
43:44
Play later
Play later
Lists
Like
Liked
43:44**Hello listeners, an earlier version of this episode contained glitches due to an upload error. If you hear breaks in the audio, please download the episode again for the corrected version. Thanks for listening, and we apologize for the mishap!** Is Trump’s Middle East Policy a Break From the Past? Last week, U.S. President Donald Trump visited th…
…
continue reading
Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marqu…
…
continue reading

1
Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate
2:30:37
2:30:37
Play later
Play later
Lists
Like
Liked
2:30:37Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge d…
…
continue reading
President Trump’s May 19 phone call with Vladimir Putin does not appear to be two hours well-spent. According to readouts, the Russian ruler agreed to continue talking about talking. Around the same time, Putin launched a massive drone strike against Ukrainian soldiers defending their country and civilians attempting to survive the long war waged a…
…
continue reading

1
Inside the Dark Web: Confessions of a Hacker
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists. Join Darnley as he breaks it…
…
continue reading

1
Signal shutters Recall, Windows Server vulnerability, pathology lab breach
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Signal adds Recall blocker Critical Windows Server 2025 dMSA vulnerability warning Pathology lab suffers data breach Huge thanks to our sponsor, Conveyor Still spending hours maintaining a massive spreadsheet of Q&A pairs or using RFP tools to answer security questionnaires? Conveyor’s AI doesn’t need hand-holding and gets you accurate answers ever…
…
continue reading

1
Mic Drop: Blockchain buzzkill — one miner’s lament.
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37When Richard Hunter heard about Kentucky’s generous crypto incentives, he packed up his Bitcoin machines and pointed them south. He imagined a booming business, jobs for locals, and maybe—just maybe—a shot at redemption. But what he got… was a buzzkill. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Cybersecurity Threats and Breaches: Critical Updates and Insights
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24In this episode of Cybersecurity today, host Jim Love reports on various critical cyber threats and data breaches. A newly discovered flaw in Windows Server 2025 allows attackers to seize full domain control, referred to by researchers as the 'bad successor' exploit. Government messaging app Telem Message, a customized version of Signal, was hacked…
…
continue reading

1
CYFIRMA Research: GhostSpy- Web-Based Android RAT
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time, SMS, Contacts, Call logs, files and silently auto-grants all permissions. Once installed, it takes full c…
…
continue reading

1
AI to solve housing troubles, ATO denies security issues, and our favourite data breach tool
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft have a chat about everything, from the NSW government’s new drive to use AI to solve the housing crisis to deepfake takedowns, who may or may not be behind the hacking campaign targeting big-name UK retailers (still!), security issues at the Australian Taxation Office, …
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading
A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies requ…
…
continue reading

1
S17 E04 (VIDEO) Adapting to AI & Rethinking What We Protect
53:22
53:22
Play later
Play later
Lists
Like
Liked
53:22Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
…
continue reading
In May 2025, Coinbase, one of the largest cryptocurrency exchanges in the world, got hacked. Or did they? It was more like a near-miss. But while we might wipe our brows in relief over this latest mishap, it doesn't bode well for the future of cryptocurrency, which is currently unregulated, uninsured, and just waiting for the next big catastrophe t…
…
continue reading

1
Kettering Health outage, Lumma disrupted, Opexus "major lapse"
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18Ransomware attack knocks out Kettering Health Lumma malware operation disrupted Federal agencies impacted by “major lapse” at Opexus Huge thanks to our sponsor, Conveyor Half-baked AI answers to security questionnaires are worse than no answer at all. Conveyor’s AI gets it right the first time—with market-leading accuracy rates and full citations f…
…
continue reading

1
Inside the attack chain: A new methodology for tracking compartmentalized threats
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it…
…
continue reading

1
Transatlantic security crisis? NATO and Europe's strategic dilemma
56:15
56:15
Play later
Play later
Lists
Like
Liked
56:15Is Europe ready to defend itself without the United States? What roles do major countries like France, Germany, the UK, and partners like Australia play in this equation? How is the European defence industry responding to the war in Ukraine and rising geopolitical uncertainty? Are the Euro-Atlantic and Indo-Pacific theatres now fully integrated in …
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02AI is changing security fast—hear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead! With DeepSentinel CEO and AI expert Dave Selinger.By Extra Something Media
…
continue reading

1
WORLDS FIRST CPU Ransomware! - 2025-05-19
53:26
53:26
Play later
Play later
Lists
Like
Liked
53:26Register for Free, Live webcasts & summits: https://poweredbybhis.coma 00:00 - PreShow Banter™ — Twiddle Me This 02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-19 03:10 - Story # 1: Coinbase - Standing Up to Extortionists 11:26 - Story # 2: World’s first CPU-level ransomware 15:09 - Story # 3: New Intel CPU flaws leak se…
…
continue reading

1
S17 E04 Adapting to AI & Rethinking What We Protect
53:22
53:22
Play later
Play later
Lists
Like
Liked
53:22Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
…
continue reading
A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing cam…
…
continue reading

1
Dude, Where’s My Token? The Hidden Risk of MFA
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53#CyberSecurity #MultiFactorAuthentication #PhishingAwareness - In this episode of Cyber SitRep, Eric and Mike explore the risks of stolen authentication tokens and how even multi-factor authentication (MFA) can be compromised when users are targeted through phishing and proxy attacks. They break down how token-based access works, share real-world h…
…
continue reading
Cyber Sitrep Episode #18 - Cyber Security 101 "Introduction" - Today we are starting a 6-part series in which we go into a well-rounded guide to Cyber Security for Small and Medium businesses. In this specific episode Eric and Mike go into the introduction to the series and a bit of an overview of what is to come. Episodes will be on Tuesday's and …
…
continue reading
In this Episode Eric and Mike close out the 6 part series about Cyber Security 101 with the Edge. Cyber Sitrep Episode #23 Cyber Security 101 Ep.6 "Edge" Episode Links: https://csrc.nist.gov/publications/sp800 Episodes Every Wednesday at 11 A.M. MST Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachh…
…
continue reading
Cyber Sitrep Episode #21 - Cyber Security 101 "Ring 2" - In this episode Eric and Mike talk about what all is within ring 2 of our Cyber Security 101 course. STIG Link: https://public.cyber.mil/stigs/ Episodes Every Wednesday at 11 A.M. MST Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ …
…
continue reading

1
CMMC Scoping: What You Don’t Know WILL Hurt You
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59#cmmc #cybersecurity #scopematters In this episode of The Cyber Sitrep, Eric and Mike dive deep into one of the most critical — yet misunderstood — elements of CMMC assessments: scoping. They explain why scoping your environment accurately can save you serious time, money, and pain during a C3PAO assessment. From defining "in scope" vs. "out of sco…
…
continue reading

1
Microsoft Is Killing Windows 10—Here’s What Happens Next
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14#cybersecurity #windows10 #technews In this episode of The Cyber Sitrep, Eric and Mike discuss the upcoming end-of-life for Windows 10 and what it means for users still on the platform. They break down the risks of running an unsupported operating system, the importance of security updates, and why migrating to Windows 11 is critical before the Oct…
…
continue reading
Cyber Sitrep Episode #19 - Cyber Security 101 "Core" - In this episode Eric and Mike go over how Data backups, and training are a great start for your business cyber health. Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ The Cyber Sitrep brings you all the latest cybersecurity news, comm…
…
continue reading
Cyber Sitrep Episode #22 Cyber Security 101 "Ring 3" - In this Episode Eric and Mike talk about STIGS, Audits, and SIEM's. Episode Links: STIG: https://public.cyber.mil/stigs/ CIS: https://www.cisecurity.org/cis-benchmarks Microsoft Sentinel: https://azure.microsoft.com/en-us/products/microsoft-sentinel Tenable: https://www.tenable.com/ Episodes Ev…
…
continue reading
Cyber Sitrep Episode #-20 Cyber Security 101 "Ring 1" - In this Episode Eric and Mike talk about the first Ring of Cyber Security 101. Episodes Every Wednesday at 11 A.M. MST https://www.av-comparatives.org/ Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ The Cyber Sitrep brings you all t…
…
continue reading

1
DOJ investigates Coinbase attack, Dutch cyber-espionage law passes, VanHelsing ransomeware leaked
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43US DOJ opens investigation into Coinbase's recent cyberattack Dutch government passes law to criminalize cyber-espionage Ransomware attack on food distributor spells more pain for UK supermarkets Huge thanks to our sponsor, Conveyor What if your sales team could answer security questions themselves—without blowing up your Slack or email every 10 mi…
…
continue reading

1
Microsoft Emergency Patch, Pwn2Own Berlin 2025 Highlights, and Emerging Cybersecurity Threats
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01In this episode of 'Cybersecurity Today,' host Jim Love discusses several urgent cybersecurity topics. Microsoft has released an emergency patch after a recent Windows update caused BitLocker recovery mode on certain systems, locking users out without warning. The issue stems from the May security update affecting systems using Intel, vPro chips, a…
…
continue reading

1
The Enemy Within: The Hidden Risk of Insider Threats - Ep 150
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47In this episode of Reimagining Cyber, Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, delves inro the complex issue of insider threats. He concentrates on the two main types of insider threats: malicious insiders who knowingly abuse their access, and unintentional insiders who fall prey to phishing and other social engineering att…
…
continue reading

1
Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain’s legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti …
…
continue reading