Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Week In Review Podcasts

show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

1
Defense & Aerospace Report

Defense & Aerospace Report, sponsored by Bell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Defense and Aerospace Report podcast, our weekly podcast on the global defense and aerospace business sponsored by Bell, and hosted by Defense & Aerospace Report Editor Vago Muradian. Each week, we’ll bring you interviews with industry leaders and the business’ best analysts to put events in context, identify trends and keep an eye on what’s next in a fast-moving world. Defense & Aerospace Report is your global source for national security and aerospace news, thought leadershi ...
  continue reading
 
Loading …
show series
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University – also check out Derek’s substack. Thanks to our show sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That’s why c…
  continue reading
 
Hackers hijacked Google’s Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customers’ data by breaching its Salesforce database Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybers…
  continue reading
 
Mark Montgomery, a retired US Navy rear admiral who is now the senior director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies and the executive director of the Cyber Solarium 2.0 project, joins Defense & Aerospace Report Editor Vago Muradian to discuss how to improve defense cooperation with Taiwan to …
  continue reading
 
Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
  continue reading
 
PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurit…
  continue reading
 
On today’s Strategy Series program, sponsored by General Atomics Aeronautical Systems, Richard Danzig, the 71st Secretary of the US Navy and Rand Corporation trustee; joins Defense & Aerospace Report Editor Vago Muradian to discuss his new report for the think tank — “Artificial Intelligence, Cybersecurity, and National Security: The Fierce Urgency…
  continue reading
 
Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
  continue reading
 
Microsoft and Google among most affected as zero day exploits jump 46% Vietnamese hackers use PXA Stealer, hit 4,000 IPs and steal 200,000 passwords globally New Plague Linux malware stealthily maintains SSH access Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity contr…
  continue reading
 
The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
  continue reading
 
Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start y…
  continue reading
 
On this week’s Defense & Aerospace Report Business Roundtable, sponsored by Bell, Dr. “Rocket” Ron Epstein of Bank of America Securities, Sash Tusa of the independent equity research firm Agency Partners, and Richard Aboulafia of the AeroDynamic advisory consultancy join host Vago Muradian to discuss a down market on tariff concerns and sharply red…
  continue reading
 
Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
  continue reading
 
On this week’s Defense & Aerospace Report Washington Roundtable, Dr. Patrick Cronin of the Hudson Institute think tank, Michael Herson of American Defense International, former Pentagon Europe chief Jim Townsend of the Center for a New American Security, former Pentagon comptroller Dr. Dov Zakheim of the Center for Strategic and International Studi…
  continue reading
 
Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s l…
  continue reading
 
NATM network breached and attacked through 4G Raspberry Pi Easterly’s appointment to West Point rescinded Report links Chinese companies to tools used by state-sponsored hackers Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in auto…
  continue reading
 
In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
  continue reading
 
Electra is a fascinating company that straddles the line between traditional aviation and advanced air mobility. Their hybrid, quiet, ultra-short-takeoff aircraft are finding interest from the US military. We learn more from Donn Yates, their head of government markets. Powered by GE!By Defense & Aerospace Report, sponsored by Bell
  continue reading
 
Oh No! Lenovo You sunk my battleship! Or did you? Russians unable to get a taste of their own medicine Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your a…
  continue reading
 
On today’s Land Warfare Series program, sponsored American Rheinmetall, Sam Bendett of the Center for Naval Analyses and Dr. Eugene Rumer, the director of the Russia and Eurasia program at the Carnegie Endowment for International Peace, join Defense & Aerospace Report Editor Vago Muradian to discuss the latest on the Ukraine war, how both sides are…
  continue reading
 
In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406…
  continue reading
 
Critical Authentication Flaw Identified in Base44 Vibe Coding Platform French telecom giant Orange discloses cyberattack FBI seizes $2.4M in Bitcoin from new Chaos ransomware operation Huge thanks to our sponsor, Dropzone AI What if your SOC could investigate every single alert without burning out your team? That's exactly what Dropzone AI does. Th…
  continue reading
 
On today’s Technology Report podcast, Dr. Jim Lewis, a distinguished fellow with the Tech Policy Program at the Center for European Policy Analysis, joins Defense & Aerospace Report Editor Vago Muradian to discuss President Trump’s new strategy to maintain America’s artificial intelligence lead against rising competitors; status of the Stargate Pro…
  continue reading
 
A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
  continue reading
 
Hacktivist attack grounds Russian flights Naval group denies breach, hackers beg to differ Dating app breach exposes thousands of women’s pictures Huge thanks to our sponsor, Dropzone AI Let me tell you about Dropzone AI—they're revolutionizing how security teams work. Companies like CBTS and Zapier use their AI to investigate alerts automatically,…
  continue reading
 
On today’s Look Ahead program, sponsored by HII, Byron Callan of the independent Washington research firm Capital Alpha Partners joins Defense & Aerospace Report Editor Vago Muradian to discuss Washington’s trade deals with Japan and the European Union that would see an increase of baseline tariffs increase to 15 percent; President Trump’s assertio…
  continue reading
 
Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
  continue reading
 
NASCAR announces data breach following March cyberattack Plankey appears to be on track to lead CISA Microsoft investigates another outage affecting 365 admin center Huge thanks to our sponsor, Dropzone AI Today's sponsor is Dropzone AI, the leader in AI-powered SOC automation. Major companies like Zapier and UiPath are using Dropzone to give their…
  continue reading
 
On this week’s Defense & Aerospace Report Business Roundtable, sponsored by Bell, Dr. “Rocket” Ron Epstein of Bank of America Securities, Sash Tusa of the independent equity research firm Agency Partners, and Richard Aboulafia of the AeroDynamic advisory consultancy join host Vago Muradian to discuss new records on Wall Street as Washington strikes…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Nudge Security Nudge Security discovers new apps, accounts, and data-sharing in real-time and helps guide employees toward secure behaviors. Instead of trying t…
  continue reading
 
On this week’s Defense & Aerospace Report Washington Roundtable, Dr. Patrick Cronin of the Hudson Institute think tank, Michael Herson of American Defense International, former Pentagon Europe chief Jim Townsend of the Center for a New American Security, former Pentagon comptroller Dr. Dov Zakheim of the Center for Strategic and International Studi…
  continue reading
 
SonicWall announces SMA 100 patches FBI warns about The Com Compromised Amazon Q extension deletes everything Huge thanks to our sponsor, Nudge Security Nudge Security discovers new apps, accounts, and data-sharing in real-time and helps guide employees toward secure behaviors. Instead of trying to control everything, we give IT and security teams …
  continue reading
 
We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
  continue reading
 
What’s the latest with the Golden Dome missile defense project? How has Ukraine’s experience influenced US air defense thinking? And what is mesh sensing? We get answers to those questions from Dr. Tom Karako, director of the Missile Defense Program at the Center for Strategic and International Studies. Plus this week’s headlines in airpower, and t…
  continue reading
 
Goodbye toha, or as they say in Russian, Прощай “Trust the AI," they said. “What could go wrong?” they said Adobe apps advisory activated Huge thanks to our sponsor, Nudge Security Trying to squeeze a few more items into your budget? Nudge Security can help by discovering up to TWO YEARS of historical SaaS spend along with usage insights so you can…
  continue reading
 
On today’s Technology Report podcast, sponsored by Elbit America, John Cofrancesco, the cofounder of Applied AI Company and American AI Logistics, joins Defense & Aerospace Report Editor Vago Muradian to discuss how AI can help companies better compete for bulk government contracts; how the technology can help the government make better decisions m…
  continue reading
 
How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
  continue reading
 
Microsoft links Sharepoint ToolShell attacks to Chinese hackers Russian threat actors target NGOs with new OAuth phishing tactics Silicon Valley engineer admits theft of US missile tech secrets Huge thanks to our sponsor, Nudge Security Nudge Security discovers every SaaS app used in your org, secures configurations, enforces MFA, and manages app-t…
  continue reading
 
Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.darkreading.com/threat-intelligence/matanbuchus-loader-ransomware-infections This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://ww…
  continue reading
 
On today’s Strategy Series program, sponsored by General Atomics Aeronautical Systems, Dr. Darrell Bricker, the CEO of Ipsos Public Affairs, joins Defense & Aerospace Report Editor Vago Muradian to discuss President Trump’s popularity six months into his new administration; international sentiment toward the United States; how Trump drives the glob…
  continue reading
 
AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
  continue reading
 
SharePoint RCE flaws patched and exploited from China Dell acknowledges World Leaks data breach $44 million stolen from crypto exchange Huge thanks to our sponsor, Nudge Security Nudge Security discovers every GenAI tool ever used in your org, even those you’ve never heard of. For each tool, you’ll see who introduced it, who else is using it, where…
  continue reading
 
Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
  continue reading
 
Hewlett Packard warns of hardcoded passwords in Aruba access points SharePoint zero-day exploited via RCE, no patch available Russian vodka producer suffers ransomware attack Huge thanks to our sponsor, Nudge Security Discover every SaaS account ever created by anyone in your org within minutes of starting a free trial. Harden configs, enforce MFA,…
  continue reading
 
On this week’s Defense & Aerospace Report Business Roundtable, sponsored by Bell, Dr. “Rocket” Ron Epstein of Bank of America Securities, Sash Tusa of the independent equity research firm Agency Partners, and Richard Aboulafia of the AeroDynamic advisory consultancy join host Vago Muradian to discuss another bull-market high on Wall Street; Preside…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Cyrus Tibbs, CISO, PennyMac Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatL…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play