Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity News Podcasts

show episodes
 
Artwork

1
PBD Podcast

PBD Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The PBD Podcast, hosted by Patrick Bet-David, delivers engaging conversations on business, entrepreneurship, current events, politics, and sports. Live every Monday, Wednesday, and Friday at 9:00 AM EST with the Home Team and special guests, the show brings real-time reactions and dynamic discussions from the VAULT inside Valuetainment’s Fort Lauderdale studio. Every Tuesday and Thursday at 9:00 AM EST, tune in for exclusive interviews with top entrepreneurs, leaders, and newsmakers from aro ...
  continue reading
 
Wrap your day with the world’s biggest stories. We set the bar on the daily news catch-up, going deeper on news stories that speak to the moment. An evening news podcast updated seven days a week, from CBC News. Sort out what's real, what's relevant and what’s truly new, from a Canadian perspective, with hosts Susan Bonner and Stephanie Skenderis. Context, analysis and surprise — all in about 25 minutes.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
Artwork

1
Big Technology Podcast

Alex Kantrowitz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Big Technology Podcast takes you behind the scenes in the tech world featuring interviews with plugged-in insiders and outside agitators. Alex Kantrowitz, a Silicon Valley journalist who's interviewed the world's top tech CEOs — from Mark Zuckerberg to Larry Ellison — is the host.
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Artwork

1
Lock and Code

Malwarebytes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
OUCH!

Joel Anker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
GovCIO Media & Research Podcasts

GovCIO Media & Research

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork
 
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
  continue reading
 
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Artwork
 
Monday through Friday, Marketplace demystifies the digital economy in less than 10 minutes. We look past the hype and ask tough questions about an industry that's constantly changing.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

51
The FAIK Files

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
  continue reading
 
Loading …
show series
 
What happens when an AI strategy meets the real-world complexity of healthcare, law, and finance? That’s the challenge at the heart of my conversation with Mark Sherwood, CIO of Wolters Kluwer, a global leader in professional information services. With over three decades in technology leadership across Microsoft, Symantec, and Nuance, Mark brings a…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
Just days into a ceasefire between Israel and Hamas there are accusations from each side, and still more death. Hamas has not returned all of the bodies of hostages who have died, and the delivery of aid has yet to ramp up in earnest. Hamas battles Palestinian clans as the security situation remains tense. And: Lumber exporters brace themselves yet…
  continue reading
 
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
  continue reading
 
Dutch Government Blocks Chinese-Owned Nexperia Over National Security Concerns Amid Global Tensions Australia's Under-16 Social Media Ban Sparks Controversy Over Privacy, Enforcement, and Economic Impact UK Faces Unprecedented Cyber Attack Surge, Urges FTSE 350 to Bolster Defenses Amid Rising Threats Apple to Launch iPhone Air in China Amid Regulat…
  continue reading
 
How is the transition to passkeys going in 2025? 🔑 This week, we’re joined by Nick Steele from the Product team at 1Password to talk all things passwordless. He walks us through the current state of adoption and a brand-new standard that will change the way we move and share passkeys. In Crash Course, we break down public-key encryption — the power…
  continue reading
 
🎙️ UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 993: Today's episode will discuss the latest news as UK Record Cyberattacks with more news below: · NPM Infrastructure Abused in Phishin…
  continue reading
 
Episode 2: AI in healthcare Relebogile Mabotja speaks to Prof. Ismail Kalla the Associate Professor in the Division of Pulmonology and Division of Critical Care Medicine at the University of the Witwatersrand about Al in healthcare. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday a…
  continue reading
 
Relebogile Mabotja speaks to Brendon Pillay the National Head of Business Development at Indwe Risk Services discussing Indwe as a specialist insurance expertise in cybersecurity and risk protection. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lig…
  continue reading
 
Listeners respond to Relebogile Mabotja's open line question about the privileges we take for granted. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lighter touch to some of the issues of the day as well as a mix of lifestyle topics and a peak into …
  continue reading
 
The Export-Import Bank of the United States (EXIM) facilitates trades of exports of goods and services and, in doing so, deals with massive troves of data. From the Billington Cybersecurity Summit, EXIM CISO, Chief Privacy Officer, and Deputy Chief AI Officer Darren Death tells CyberCast that his agency is centralizing data about user access and be…
  continue reading
 
All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Andy Ellis, principal of Duha. Joining us is our sponsored guest, Khush Kashyap, senior director, GRC, Vanta. In this episode: Skip the Sermon When to coach versus command Making risk quantification useful Recognizing a distin…
  continue reading
 
Countries all over the world use technology to keep track of immigrants released from detention centers. The idea is to allow people to live in communities while their cases are adjudicated. But Petra Molnar of the Refugee Law Lab at York University said the technology is also often employed in ways that are too intrusive and can act like digital s…
  continue reading
 
Erie Meyer, Senior Fellow at Georgetown Law’s Institute for Technology Law & Policy and ABCD, and Laura Edelson, Assistant Professor of Computer Science at Northeastern University, who are coauthors of the recent toolkit, “Working with Technologists: Recommendations for State Enforcers and Regulators,” join Lawfare’s Justin Sherman to discuss how s…
  continue reading
 
This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botne…
  continue reading
 
One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate. Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat I…
  continue reading
 
Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
  continue reading
 
You’ve likely received a scam call or text at some point. Some of these messages come from elaborate compounds found mostly in Southeast Asia. These compounds look like call centers but operate more like prisons. In this CyberMonday crossover with WAMU’s 1A, we return to an episode and hear from listeners — on how these centers cropped up and what’…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critica…
  continue reading
 
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠ Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018. Learn more about your…
  continue reading
 
What does it take to build AI that enterprises can actually trust? That’s the question I explored with Nirankush “Kush” Panchbhai, Senior Vice President of Platform Fundamentals at ServiceNow, in a conversation about AI governance, human-centered design, and how the company’s AI Control Tower is reshaping enterprise adoption. Kush describes the AI …
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
As many Canadians gather to share a big meal and give thanks, more people than ever are going hungry. With the rising cost of groceries, one in four households is struggling to put food on the table. It has municipalities declaring hunger emergencies, food banks scrambling to meet the need, and experts calling for systemic change. And: The federal …
  continue reading
 
(0:10): Elon Musk's xAI Ventures into Gaming: Revolutionizing AI with Advanced 'World Models' (1:53): EY & Microsoft Launch Global AI Training to Empower 40,000+ Indian Professionals with Essential Skills (3:20): China's Rare Earth Export Controls Unlikely to Impact Taiwan's Chip Industry (4:43): Mappls Launches 3D Navigation and Real-Time Alerts, …
  continue reading
 
Patrick Bet-David, Tom Ellsworth, Vincent Oshana, and Adam Sosnick break down the release of Israeli hostages amid the Gaza ceasefire, Katie Porter’s bizarre “mashed potato” controversy, and Trump’s escalating economic battle with China — joined by guest Adam Carolla. ------ 👞 GET THE NEW FLB 1'S: https://bit.ly/4mXV9gd Ⓜ️ PBD PODCAST CIRCLES: http…
  continue reading
 
Jason is joined by US PIRG's right to repair campaign director Nathan Proctor, who explains why the imminent end of free support for Windows 10 computers is a ticking timebomb, with millions of computers slated for recycling centers and landfills. Nathan and Jason discuss the state of right to repair legislation all over the United States, the prog…
  continue reading
 
🎙️ Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 992: Today's episode will discuss the latest news as Houston Suburb Cyberattack with more news below: · New Oracle E-Business Suite Bug Cou…
  continue reading
 
Relebogile Mabotja speaks with Lesego Lekgothoane, Writer and Clinical Psychologist, about Default Parent Syndrome, a phenomenon where one parent, often the mother, becomes the primary caregiver and absorbs most of the emotional labour, household coordination, and childcare tasks. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannes…
  continue reading
 
702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lighter touch to some of the issues of the day as well as a mix of lifestyle topics and a peak into the worlds of entertainment and leisure. Thank you for listening to a 702 Afternoons with Relebogile Ma…
  continue reading
 
Open AI has added a checkout feature to ChatGPT, partnering with Etsy and Shopify to let users purchase some items from select merchants. OpenAI says ChatGPT's answers are still organic and unsponsored. But why not offer a seamless way to buy things that come up in certain responses? Eventually this could lead to so-called “agentic” shopping: letti…
  continue reading
 
In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Public Service Fellow Loren Voss and Senior Editors Anna Bower, Roger Parloff, Eric Columbus, and Molly Roberts to discuss the legal challenges to the National Guard deployment in Portland and Chicago, a hearing over the attempted deportation of Kilmar …
  continue reading
 
This is today’s cyber news for October 13th, 2025. The brief leads with fresh exploitation against Oracle E-Business Suite and reports of SonicWall customer backup configurations viewed by attackers, raising concerns about blueprint-level exposure and data theft. We also cover an actively exploited Gladinet CentreStack/Triofox zero-day, a record ~3…
  continue reading
 
Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
  continue reading
 
While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
  continue reading
 
This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack the latest in cybersecurity and human risk — from fake job recruiters flooding LinkedIn to deepfake chaos and a nursery hack that shocked the UK. Whether it’s scams, software flaws, or stolen art, this episode is all about where human behaviour meets digital consequence. 🕵️‍♂️ Li…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play