The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cybersecurity Interviews Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
The PBD Podcast, hosted by Patrick Bet-David, delivers engaging conversations on business, entrepreneurship, current events, politics, and sports. Live every Monday, Wednesday, and Friday at 9:00 AM EST with the Home Team and special guests, the show brings real-time reactions and dynamic discussions from the VAULT inside Valuetainment’s Fort Lauderdale studio. Every Tuesday and Thursday at 9:00 AM EST, tune in for exclusive interviews with top entrepreneurs, leaders, and newsmakers from aro ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
A journey into the heart of South Africa politics, through interviews and analysis, with your guide Sizwe Mpofu-Walsh. Ayeye!
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Tosh Show is a window into the mind of comedian Daniel Tosh. Each week Daniel interviews people from all walks of life that he finds interesting, shares his take on current events, and gives you a little insight into his world. Nothing is off limits and with endless topics to explore, Tosh and his guests will satisfy everyone's curiosity.
…
continue reading
Pressing Matters, from Big Valley Marketing, features conversations with the top influencers in B2B Technology. From Fortt Knox to Audible, the (mostly) journalists we interview on this podcast have been there for all of it – and they have thoughts on where things are going. Whether you're interested in humans, chips, cybercrime, or long-necked lutes ... welcome to Pressing Matters, presented by Big Valley Marketing.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
Welcome to the What's Next! Podcast. I've met so many brilliant people as I traveled the globe and have had some fascinating conversations that I've wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Alex Whitaker interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Bites and Bytes Podcast explores cybersecurity, technology, and beyond in the food industry. Discover the exciting world where cybersecurity, technology, and the food industry converge on the Bites and Bytes Podcast. As one of the few shows focusing on cybersecurity in the food sector, we offer unique insights and groundbreaking discussions. Our interview-style chats and in-depth discussions reveal the challenges and innovations at the intersection of digital defenses, food protection, and s ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Constellations is your connection to the innovators, business leaders, entrepreneurs and policy makers who are making—and remaking—today's satellite and space networks. Whether you're in the industry or just have a desire to learn, this podcast is for you. For more information and to subscribe to the biweekly newsletter go to www.ConstellationsMag.com
…
continue reading
Fraud Boxer is a podcast dedicated to fraud prevention, payments, and cybersecurity professionals and their industry. Jordan Harris hosts conversations, with his co-hosts Cambria Valente on ”Fraud Focus” and Jacqueline Chilton on ”Payments Corner,” on relevant topics for people in the industry and interview guests from merchants and solution providers to provide insights into a constantly evolving technical space!
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Former Founder, Mike Viscuso, and Former CEO, Patrick Morley, of cybersecurity firm Carbon Black, which sold to VMware in 2019 for $2.1B, help modern business leaders by discussing the most important entrepreneural topics today.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
1
Bridging the Cybersecurity Gap: From Tech Rooms to Boardrooms | Interview with Paul C Dwyer
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59In this episode of the Secure and Simple Podcast, Dejan Kosutic, CEO of Advisera, interviews Paul C Dwyer, founder and CEO of Cyber Risk International and president of the ICTTF. They discuss digital resilience from a business and strategic standpoint, the role of company boards in cybersecurity, and how to effectively bridge the communication gap …
…
continue reading
1
S18 E01 How Hackers Target National Security
47:50
47:50
Play later
Play later
Lists
Like
Liked
47:50Matthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led the Global Cyber Defense practice. Matthe…
…
continue reading
1
Digital Dependence EXPOSED--A Billion Dollar MELTDOWN & AI SECRETS
45:48
45:48
Play later
Play later
Lists
Like
Liked
45:48When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance. We break down: 💥 The $550M AWS outage & how it spr…
…
continue reading
1
Anonymous and the Hydra: The Digital Vigilantes Fighting Child Exploitation—Methods, Morality, and 250 FBI Probes
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
…
continue reading
1
The 764 Network: Decoding the Hydra of Online Extremism, Child Exploitation, and Real-World Murder
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49The sources provide a comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophist…
…
continue reading
An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
…
continue reading
1
The 764 Network: Threats, Tactics, and Response
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophisticated psychological…
…
continue reading
Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighter…
…
continue reading
1
Cybercrime News For Nov. 5, 2025. Crypto Scammers Taken Down In Europe. WCYB Digital Radio.
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
"Means Of Control." Data Collection & Surveillance In America. Byron Tau, Reporter & Author.
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54Byron Tau, author of "Means of Control: How The Hidden Alliance of Tech and Government Is Creating a New American Surveillance State," is an investigative reporter for The Associated Press and former reporter for The Wall Street Journal and Politico. In this episode, he joins host Charlie Osborne to discuss his book, as well as data collection in t…
…
continue reading
1
Atroposia RAT: The Malware That Scans for Its Own Exploits
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers…
…
continue reading
1
Mamdani WINS, NYC Residents PANIC, Prop 50 PASSES + Will The AI Bubble BURST? | PBD Podcast | Ep 679
2:08:35
2:08:35
Play later
Play later
Lists
Like
Liked
2:08:35Patrick Bet-David, Tom Ellsworth, Brandon Aceto, and Barry Habib break down Zohran Mamdani’s NYC victory, the mass panic among residents preparing to flee, Prop 50’s passage and its political fallout, and whether the booming AI market is on the verge of collapse. ------ 📕 REGISTER FOR BPW 2025 - FRIDAY, DECEMBER 12TH 2025: https://bit.ly/3IU2YWx Ⓜ️…
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
Mastering Cyber. Shadow IT. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
1:36
1:36
Play later
Play later
Lists
Like
Liked
1:36Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading
1
Identity Threats, AI Attacks, and the Power of Community with Filipi Pires
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode of the Security by Default podcast, host Joe Carson welcomes back Filipi Pires, Head of Identity Threat Labs & Global Product Advocate at Segura® to discuss the latest trends in identity threats and cybersecurity. They explore the evolution of attacks, particularly focusing on social engineering and the role of AI in both offensive …
…
continue reading
1
Compliance Convergence: Harmonizing DORA, NIS2, and SEC for 2025 Resilience
13:18
13:18
Play later
Play later
Lists
Like
Liked
13:18The simultaneous enforcement of the EU’s DORA (January 2025 deadline) and NIS2, alongside the U.S. SEC’s four-day disclosure rule (effective late 2023), has created an increasingly fragmented and high-stakes compliance landscape for global enterprises. This episode details how organizations can move beyond segregated checklists to build a unified c…
…
continue reading
1
Episode 160: Championing SME Security with the CIS Controls
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55In Episode 160 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Alan Watkins, CIS Controls Ambassador, to explore how the CIS Critical Security Controls® (CIS Controls®) empower small and medium-sized enterprises (SMEs) to build practical, scalable cybersecurity programs. Alan shares his journey from law enforcement to IT …
…
continue reading
1
#70 From Teen Hacker to Professional Pentester: The Journey of Kyle Hoehn
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34In this episode of The Hacker’s Cache, Kyser Clark sits down with seasoned penetration tester Kyle Hoehn to unpack the journey from a curious teen experimenting online to a full time professional in offensive security. Kyle shares how early exposure to computer tinkering and real world troubleshooting shaped his path, why foundational IT knowledge …
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Kabelo Makwane unpacks: Google, YouTube, AI, SA economy, jobs, cybersecurity, podcast regulation
40:35
40:35
Play later
Play later
Lists
Like
Liked
40:35In the age of Artificial Intelligence and technology, joining us to unpack how this affects South Africa, jobs and our economy, Google SA's country director - Kabelo Makwane explores all of this and more.By Sizwe Mpofu-Walsh
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
Once upon a time, I was an MSP. Looking at everything that MSPs have to keep track of, both internally and client-facing, can be overwhelming. I sat down with Dor Eisner of Guardz.com to talk about the biggest challenge facing MSPs.
…
continue reading
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment cen…
…
continue reading
1
Cybercrime News For Nov. 4, 2025. British Water Suppliers Hacked. WCYB Digital Radio.
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Understanding Ransomware Gangs: Key Information
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into Understanding Ransomware Gangs: Key Information. Including the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research led to cyber criminals exposed on #…
…
continue reading
1
Khumalo drops crazy CCTV footage on Sibiya
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13Lt Gen Khumalo is back at the Madlanga Commission and he has come with receipts, again! He presented CCTV footage that implicated Sibiya and his office with KT Molefe and another questionable character whose vehicle was found on his property on the day of the search and seizure at his house. Dr Sizwe Mpofu-Walsh unpacks this, the Ad Hoc Committee i…
…
continue reading
1
Cybercrime Magazine On Instagram. Celebrating 10,000 Followers. Taylor Fox, Media Coordinator.
3:46
3:46
Play later
Play later
Lists
Like
Liked
3:46Taylor Fox, Media Coordinator at Cybercrime Magazine, manages our Instagram account, which recently hit 10,000 followers. In this episode, she joins host Amanda Glassner to discuss this achievement, building the account, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com.…
…
continue reading
1
Cybercrime Wire For Nov. 4, 2025. Sweden Investigates Breach Affecting 1.5M. WCYB Digital Radio.
1:10
1:10
Play later
Play later
Lists
Like
Liked
1:10The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
In this episode of Simply Offensive, Phillip Wylie interviews Danny Jenkins, CEO and founder of ThreatLocker. Danny shares his unique journey from corporate IT to ethical hacking, discussing his innovative approach to penetration testing and cybersecurity. He emphasizes the importance of understanding technology and security configurations, the rol…
…
continue reading
1
Privacy Q&A. Consumer Perspectives On Privacy. Lena Ghamrawi, Stack Overflow.
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Lena Ghamrawi, Sr. Privacy Counsel and Data Protection Officer at Stack Overflow, is the founder of The Privacy Coach, where she provides career coaching services to help folks pave their privacy path. In this episode, Ghamrawi joins host Taylor Fox to discuss consumer perspectives on privacy. For more about Lena, visit https://lenaghamrawi.com. • …
…
continue reading
1
Guardrails and Attack Vectors: Securing the Generative AI Frontier
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45This episode dissects critical risks specific to Large Language Models (LLMs), focusing on vulnerabilities such as Prompt Injection and the potential for Sensitive Information Disclosure. It explores how CISOs must establish internal AI security standards and adopt a programmatic, offensive security approach using established governance frameworks …
…
continue reading
1
DtSR Episode 678 - CyberSecurity Has Lost the Plot
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32TL;DR: This week's pod features your favorite hosts reflecting on how security has lost its way. When everything is a catastrophe, nothing is. When every breach is world-ending, none of them matter. Have we completely lost the plot? Prepare to have a good think. YouTube Video: Have something to say? Let's hear it. Support the show >>>…
…
continue reading
1
Moving From Reactive to Proactive Security with Guardare Co-Founders.
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30Send us a text In this episode, James sat down with Lars Letonoff and Dane Fiori the Co-Founders of Guardare about the challenges SMBs face in cybersecurity today. They dive into why so many organizations struggle with tool overload, fragmented data, and the noise from their security stacks and explore why a joined-up approach is crucial to creatin…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
My Paw-some Service Dog Volunteer - Melissa Rubin
54:50
54:50
Play later
Play later
Lists
Like
Liked
54:50Daniel sits for a chat with Melissa Rubin, a volunteer puppy raiser for Guide Dogs of America.
…
continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
continue reading