Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Cyber Threats Podcasts
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
THREATCON1 is the place to go for insights on emerging cyber threats. Hosted by VulnCheck’s Security Researcher Patrick Garrity, and Chief Marketing Officer Tom Bain, THREATCON1 will give listeners critical cyber insights through discussions with top cybersecurity practitioners and leaders in the industry that drive innovation and thought leadership. Patrick and Tom will dive into emerging news stories and cyber threats, and trends that are materially shaping the industry with sharp analysis ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
Threatscape Briefing delivers daily audio sitreps on the signals shaping global risk and competition. Each episode distills the “One Big Thing” into a concise, executive-ready briefing connecting military, economic, cyber, and cultural flashpoints. Built for analysts, risk managers, and decision-makers, the format is fast, authoritative, and globally timed to keep you ahead of the curve. Threatscape Briefing is part of the Geopolitical Threatscape ecosystem and equips decision‑makers with cl ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Talion Threat Set Radio is your weekly cyber threat intelligence bulletin. We cut through the noise to give you our honest opinion on the threat news that matters.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Join mathematician and broadcaster Professor Hannah Fry as she goes behind the scenes of the world-leading research lab to uncover the extraordinary ways AI is transforming our world. No hype. No spin, just compelling discussions and grand scientific ambition.
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO of Abnormal AI.
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The SurfWatch Cyber Chat podcast includes interviews with experts on all things related to cyber risk. Learn what cybercriminals are up to and how it’s impacting businesses from those in the trenches. SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. For more information, visit www.surfwatchlabs.com.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
True crime meets cybercrime. Discover the people behind the keyboard. From Ransomware-as-a-Service (RaaS) gangs to global financial crime syndicates, the rise of sophisticated cyber threats is reshaping the world. These aren’t lone hackers — they’re organized groups running multi-million dollar operations in the shadows. In the Masked Actors podcast, cyber threat expert and former soldier turned hacker Gary Ruddell joins forces with Nick Palmer, a seasoned financial crime fighter, to investi ...
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
…
continue reading
Welcome to Orpheus Talks, your go-to source for all things cyber threat intelligence and cybersecurity. Join the Orpheus team and other industry experts as they delve into the latest trends and threats in the digital world, and provide actionable insights on how to protect yourself and your organisation.https://orpheus-cyber.com/https://twitter.com/orpheuscyberhttps://www.linkedin.com/company/orpheuscyber/
…
continue reading
We Cover the Cyberspace.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
1
🔴 Dec 23’s Top Cyber News NOW! - Ep 1032
1:37:26
1:37:26
Play later
Play later
Lists
Like
Liked
1:37:26The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
Insider Threats | When the Hacker Already Has a Badge
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Question? Text our Studio direct. 🔥The Cybercrime Junkies show debunks the myth of the typical cyber villain, focusing on how everyday situations can lead to significant `cyber security` breaches. We discuss real-world `cybercrime` scenarios involving `insider` threats and the critical need for `insider threat detection`. Understanding these risks …
…
continue reading
1
Ep. 36 - TIBER-EU Explained: How Threat-Led Red Teaming Is Redefining Cyber Resilience
13:14
13:14
Play later
Play later
Lists
Like
Liked
13:14Threat-led red teaming is no longer optional in Europe — it’s becoming the foundation of cyber resilience. In this episode of The Cyber Resilience Brief, host Tova Dvorin is joined by Adrian Culley, SafeBreach’s offensive security expert for Europe and the UK, to break down the TIBER-EU framework and why it’s reshaping how financial institutions an…
…
continue reading
1
Season 1 - Episode 22 (Pedro Kertzman & Valerii Soloninka)
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36Curiosity can rewrite a career—and change how an investigation ends. We sit down with Valeri Soloninka, a Russian-speaking cybersecurity professional now protecting government entities in the UAE, to trace a path from hands-on engineering to enterprise SOC work and into the high-impact world of operational and tactical cyber threat intelligence. Al…
…
continue reading
1
Episode 162: Before the Breach How Attackers Profile Your Organization
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what …
…
continue reading
1
teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks
43:16
43:16
Play later
Play later
Lists
Like
Liked
43:16How cyber criminals are weaponising AI to defeat your threat detection and response Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks Thom Langfo…
…
continue reading
1
Episode 07: The Biggest Cyber Threats Today - Nabil Hannan on Insecure Software, CVEs & AI
50:09
50:09
Play later
Play later
Lists
Like
Liked
50:09In this episode of THREATCON1, Tom and Patrick sit down with Nabil Hannan, Field CISO at NetSPI, AI-focused startup advisor, and host of the Agent of Influence podcast. Nabil shares his unique perspective on today’s most pressing cybersecurity challenges, including: Insecure software and why vulnerabilities are becoming increasingly dangerous in ou…
…
continue reading
1
Securing the Future: Anthony Grieco's Insights on Cyber Threats
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35In this episode of the 'Better Safe Than Sorry' podcast, Adrian Havette from Wipro Switzerland's Cybersecurity Practice interviews Anthony Greco, Senior Vice President and Chief Security and Trust Officer at Cisco. They discuss the evolving threat landscape, the impact of AI on cyberattacks, the importance of upgrading network infrastructure, and t…
…
continue reading
1
CYFIRMA Research: Rising Cybercrime During Black Friday & Cyber Monday- A 2025 Threat Intelligence Report
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05Black Friday & Cyber Monday Cyber Threats Are Already Here As festive shopping surges, so does cybercrime. CYFIRMA’s latest analysis reveals a spike in fake websites, phishing campaigns, malicious ZIP downloads, UPI-based payment scams, and dark-web-powered phishing kits—all engineered to exploit the 2025 holiday rush. Our researchers uncovered mul…
…
continue reading
1
The Dark Truth About Modern Cyber Threats | Joshua Domagalski, CISO, Astronomer
41:09
41:09
Play later
Play later
Lists
Like
Liked
41:09In this powerful episode, host David Redekop sits down with Joshua Domagalski, Chief Information Security Officer and former offensive operator, to explore the real complexities of modern cyber defense. Joshua opens up about his journey from the military to cybersecurity leadership, the shift from attacking systems to protecting them, and why defen…
…
continue reading
1
Cyber Threats to Water Infrastructure: Insights from Josh Corman
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48Cyber attacks on water infrastructure are growing. Josh Corman of IAmTheCavalry joins us to discuss efforts to secure critical water systems. The post Cyber Threats to Water Infrastructure: Insights from Josh Corman appeared first on The Security Ledger with Paul F. Roberts.By Paul F. Roberts
…
continue reading
1
Episode 8: When Offense Meets Defense — How Cybersecurity Teams Reduce Risk Faster | Tyler Shields
41:29
41:29
Play later
Play later
Lists
Like
Liked
41:29In this episode of the Threatcon1 Podcast, Tom and Patrick sit down with Tyler Shields, Cybersecurity Strategy Analyst at Omdia, for a wide-ranging conversation on where cybersecurity is heading — and what actually matters to practitioners right now. Tyler brings a rare perspective shaped by years spent across research, offensive security, vendor s…
…
continue reading
Could a single BGP trick really break the internet? A new “BGP Vortex” claim says yes - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world. In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Net…
…
continue reading
1
The MOST INSANE Things That's Happened in Cyber Space This Month!
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51Question? Text our Studio direct. New Episode🔥🔥The Cybercrime Junkies show discusses contemporary `cyber security` challenges, emphasizing that older notions of threats are outdated. We dive into how direct `hacking` via `wifi` can lead to gaining `root` access, and how quick action is needed to mitigate these `exploit`s. Stay informed to protect y…
…
continue reading
1
🔴 Dec 22’s Top Cyber News NOW! - Ep 1031
1:31:59
1:31:59
Play later
Play later
Lists
Like
Liked
1:31:59The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
Ransomware Real Life Stories Effect On People. PART 2
48:48
48:48
Play later
Play later
Lists
Like
Liked
48:48Question? Text our Studio direct. Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real…
…
continue reading
1
Ransomware Real Life Stories Effect On People. PART 1
36:01
36:01
Play later
Play later
Lists
Like
Liked
36:01Question? Text our Studio direct. Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real…
…
continue reading
1
🔴 Dec 19’s Top Cyber News NOW! - Ep 1030
1:58:52
1:58:52
Play later
Play later
Lists
Like
Liked
1:58:52The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
Brain Cipher: What happens when national infrastructure comes under strike?
25:53
25:53
Play later
Play later
Lists
Like
Liked
25:53Send us a text Indonesia, June 2024 - 210 critical government agencies were crippled in one fell swoop. Immigration services were in disarray; customs officers locked out of critical systems and travellers left stranded in airport and ferry terminals facing delays that would continue for a full week. The culprit? Brain Cipher, a ransomware group ba…
…
continue reading
1
Live Special: Securing the Connected World with Thomas Harvey
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In this special live episode of Cyber Leaders, Ciaran sits down with Thomas Harvey, CISO at Santander UK. As one of the UK’s leading operational cybersecurity figures, Thomas discusses the growing need for cross-sector collaboration, why a more connected security community is essential to national cyber resilience, and how building trust can help c…
…
continue reading
1
Geert Baudewijns: Inside Ransomware Negotiations and the Ethics of Paying
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16What really happens when a company negotiates with ransomware groups? In this episode of THEOS Cybernova, Paul Jackson speaks with Geert Baudewijns, founder of Secutec and a veteran ransomware negotiator with over 500 real-world cases. Geert explains how ransomware negotiations actually work, from verifying stolen data and confirming the real threa…
…
continue reading
1
Bondi shooting misinformation, ShinyHunters returns, and how to stay cyber safe while travelling
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49This week, for the last Cyber Uncut of 2025, David Hollingworth and Daniel Croft talk about Grok's spreading of misinformation regarding the tragic Bondi terror attack, OpenAI's admission of "high cyber risk", the re-emergence of ShinyHunters with a string of possible extortion attempts, ransomware attacks on medical centres, and important tips for…
…
continue reading
1
Should we worry about America’s security strategy?
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46As both the year and the current series of The Briefing Room draw to a close, Europe and much of the world have been digesting a lengthy document outlining the Trump administration’s view of foreign policy. The National Security Strategy covers much of the globe but extra special vitriol was reserved for Europe with dire warnings that the continent…
…
continue reading
1
🔴 Dec 18’s Top Cyber News NOW! - Ep 1029
1:28:45
1:28:45
Play later
Play later
Lists
Like
Liked
1:28:45The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
CYFIRMA Research- SeedSnatcher: Dissecting an Android Malware Targeting Multiple Crypto Wallet Mnemonic Phrases
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Mobile Threat Alert: Crypto Mnemonic Phrase Stealer SeedSnatcher is a newly uncovered Android malware family targeting the crypto ecosystem, built to steal users’ mnemonic recovery phrases using a sophisticated DisplayOverlay attack Capabilities: Intercepts and exfiltrates seed phrases and private keys from major cryptocurrency wallets Presents dec…
…
continue reading
1
React2Shell Attacks Evolve, ClickFix Attacks, and Holiday Season Threats
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06) ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39) New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50) Holiday Season Attac…
…
continue reading
1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23Question? Text our Studio direct. This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian G…
…
continue reading
1
🔴 Dec 17’s Top Cyber News NOW! - Ep 1028
1:31:34
1:31:34
Play later
Play later
Lists
Like
Liked
1:31:34The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
Ep. 35 - BAS, APTs, AEV, and CTEM Explained: A Practical Guide to Cybersecurity Acronyms
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55In this episode of the Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley clearly and practically explain some of the most commonly used — and most commonly misunderstood — terms in modern cybersecurity. Together, they break down: What Breach and Attack Simulation (BAS) actually means in practice How Advanced Persistent Threats (APTs) oper…
…
continue reading
1
🔴 Dec 16’s Top Cyber News NOW! - Ep 1027
1:51:46
1:51:46
Play later
Play later
Lists
Like
Liked
1:51:46The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
The Future of Intelligence with Demis Hassabis (Co-founder and CEO of DeepMind)
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20Thanks for joining us this year. 🔔 Subscribe to stay updated on our return in 2026, and revisit our episode library to catch up on everything from driverless cars to drug discovery: https://www.youtube.com/playlist?list=PLqYmG7hTraZBiUr6_Qf8YTS2Oqy3OGZEj Please leave us a review on Spotify or Apple Podcasts if you enjoyed this episode. We always wa…
…
continue reading
Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All from the update server your entire Windows estate trusts by default. One weak crypto key and a broken deserialization function let attackers hit your WSUS server with unauthenticated SYSTEM-level code…
…
continue reading
1
CYFIRMA Research- RTO Challan Fraud A Technical Report on APK-Based Financial and Identity Theft
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17CYFIRMA researchers have identified a sophisticated Android malware operation spreading via fake RTO Challan/e-Challan notifications shared over WhatsApp. The malicious APK uses two-stage installation, NP-based code obfuscation, and a custom VPN layer to evade detection and maintain persistent control over infected devices. C2 Infrastructure Expose…
…
continue reading
1
CONTESTED GROUND: The nexus of national security, social cohesion and grey-zone warfare
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35In this solemn episode of the Contested Ground podcast, hosts Phil Tarrant, Major General (Ret'd) Dr Marcus Thompson and Steve Kuper discuss the immediate aftermath of the Bondi Beach terror attack. The trio discuss the terrorist shooting at a Hanukkah celebration on Bondi Beach, Sydney, which resulted in at least 15 deaths and over 40 injuries. Th…
…
continue reading
1
🔴 Dec 15’s Top Cyber News NOW! - Ep 1026
1:14:12
1:14:12
Play later
Play later
Lists
Like
Liked
1:14:12The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
1
Gaming to Cybersecurity: How AI Agents Fight Alert Overload
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edward Wu, founder and CEO of DropZone AI, joins The Audit crew to reveal how large language models are transforming security operations—and why the future of cyber defense looks more like a drone war tha…
…
continue reading
1
AI Hackers Are Now COMPLETELY UNSTOPPABLE
17:02
17:02
Play later
Play later
Lists
Like
Liked
17:02Question? Text our Studio direct. Today we’re talking about AI-powered cybercrime—a phrase that sounds like a marketing stunt but is, unfortunately, very real. Cybercriminals basically got a software update, and now they’re running their operations with more automation, more scale, and — let’s just say it — better customer service than half the ven…
…
continue reading
1
🔴 Dec 12’s Top Cyber News NOW! - Ep 1025
1:39:07
1:39:07
Play later
Play later
Lists
Like
Liked
1:39:07The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
1
The Hidden Layer of Cybersecurity: Andreas Taudte on DNS & DDI Defense
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45In this episode of The Defender’s Log, host David Redekop sits down with DNS and DDI expert Andreas Taudte, who brings more than 16 years of experience in network security, DNS architecture, and threat mitigation. Together, they unpack the real challenges organizations face with DNS, from evasion techniques and tunneling threats to the growing comp…
…
continue reading
1
Episode 161: The Evolution of Pentesting Going Into 2026
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this episode Brad and Spencer discuss the rapid technology shift that's happening in cybersecurity, hybrid pentesting models and the overall evolution of pen testing as we head into 2026. Need a pentest before the end of the year? Learn how here... Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com…
…
continue reading
1
CYFIRMA Research- Tracking Ransomware – November 2025
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17CYFIRMA | November 2025 Ransomware Snapshot Ransomware activity shifted fast in November—Akira and INC Ransom surged; AI-driven tools accelerated attacks, and critical sectors like Manufacturing, IT, and Professional Services took the heaviest hits. North America remained the top target as threat actors expanded into virtualization platforms and ev…
…
continue reading
1
Who Really Controls the Internet—And Why it Matters with Emily Taylor and Roxana Radu
46:38
46:38
Play later
Play later
Lists
Like
Liked
46:38In this episode, Ciaran and James speak with Emily Taylor of Oxford Information Labs and Roxana Radu, Associate Professor of Digital Technologies and Public Policy at the Blavatnik School of Government, University of Oxford, about who really controls the internet. Emily and Roxana discuss how internet governance operates amid shifting geopolitics, …
…
continue reading
1
Cathy Chan: Post-Quantum Security and the Shift Toward Crypto-Agility
32:12
32:12
Play later
Play later
Lists
Like
Liked
32:12Quantum computing is moving from theory to reality, and with it comes a fundamental shift in how organizations must protect long-lived and sensitive data. In this episode, Cathy Chan from Cyberforce explains what Q-Day really means, why “harvest now, decrypt later” is already a live threat, and how enterprises can build crypto-agility before post-q…
…
continue reading
1
The Pentagon's new AI platform, SafePay ransomware scores a hat-trick, and social media ban
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47This episode discusses the US Department of War's AI "Manifest Destiny", hackers going hard on Aussie victims, and Australia bringing in its brand new social media ban. Hosts David Hollingworth and Daniel Croft kick things off with artificial intelligence, with CommBank trialling a new DevOps agent and the Pentagon launching its new GenAI.mil platf…
…
continue reading