Get ready for your aha moment: Every weekday, host Meghna Chakrabarti pierces your news bubble to expose the whole story. Getting answers to the questions that need to be asked, examining our history and the human condition. No topic is too complicated or off the table. It’s all On Point.
…
continue reading
Cybersecurity News Podcasts
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
We talk to interesting people via podcast and weekly livestream.
…
continue reading
Listen for today's top stories, with context, in just 15 minutes. Get informed from Bloomberg's 3,000 journalists and analysts.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Each weekday morning we bring you the tech news you need today, and then in the afternoon we showcase stories about the technology, science, and culture that will influence tomorrow, all brought to you by Engadget.
…
continue reading
In Season 4 of Interpreting India, we continue our exploration of the dynamic forces that will shape India's global standing. At Carnegie India, our diverse lineup of experts will host critical discussions at the intersection of technology, the economy, and international security. Join us as we navigate the complexities of geopolitical shifts and rapid technological advancements. This season promises insightful conversations and fresh perspectives on the challenges and opportunities that lie ...
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
1
OpenAI's new confession system teaches models to be honest, India will no longer require smartphone makers to preinstall its state-run 'cybersecurity' app, and Meta's Oversight Board wants to expand its ...
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07-Since large language models are often trained to produce the response that seems to be desired, they can become increasingly likely to provide sycophancy or state hallucinations with total confidence. -After blowback from Apple, Samsung and opposition leaders, the Modi government issued a statement saying it "has decided not to make the pre-instal…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Daybreak Weekend: Fed Decision, Cybersecurity Conference, China Eco
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05Bloomberg Daybreak Weekend with Host Nathan Hager take a look at some of the stories we'll be tracking in the coming week. In the US – a look ahead to next week’s Fed decision and earnings from Oracle and Adobe. In the UK – a look ahead to the Blackhat cybersecurity conference. In Asia – a look ahead to China consumer and producer price data. See o…
…
continue reading
1
Meta is reportedly going to slash spending on the metaverse
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00The company is allegedly considering massive cuts to the project. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Engadget
…
continue reading
1
China’s quiet crawl into critical networks.
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
…
continue reading
Earlier this fall, there were no rap songs in the Billboard Top 40 for the first time since 1990. Is this just a blip in commercial popularity, or is it a sign that hip hop is losing its grip on mainstream America?By WBUR
…
continue reading
1
The New York Times is suing Perplexity for copyright infringement; while Meta signs commercial AI data agreements with publishers to offer real-time news on Meta AI
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36The New York Times filed a copyright lawsuit against Perplexity, joining other publishers using legal action as leverage to force AI companies into licensing deals that compensate content creators. Also, Meta is partnering with CNN, Fox News, Fox Sports, Le Monde Group, the People Inc. portfolio of media brands, The Daily Caller, The Washington Exa…
…
continue reading
1
Lawfare Live: The EU Fines X 120 M Euros - What Comes Next?
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50On Dec. 5, the European Commission announced that they are fining X (formerlly Twitter) 120 million euros for impersonation scams with “verification,” broken advertising transpaency system, and blocking researchers from its platform. On a Lawfare Live, Lawfare Senior Editor Kate Klonick and Lawfare Contributing Editor Renee DiResta analyzed the dec…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
…
continue reading
1
Taking Control Of Software Supply Chains in the Open Source Era
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
Netflix says it’s buying Warner Brothers, Chinese hackers may be targeting government entities using 'Brickstorm' malware, and Russia reportedly bans Snapchat and FaceTime
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42-Shortly after rumors of a deal between the two media giants broke, Netflix has announced it is buying Warner Bros., HBO and HBO Max for approximately $82.7 billion. If approved, the deal will take place after Warner Bros. has disentangled itself from both its legacy cable -Hackers with links to China reportedly successfully infiltrated a number of…
…
continue reading
1
The Jackpod: Rural ressentiment, or ‘the country strikes back’
44:25
44:25
Play later
Play later
Lists
Like
Liked
44:25On Point news analyst Jack Beatty on the modern history of the multi-faceted divide between rural and urban America and why it threatens democracy.By WBUR
…
continue reading
1
Warner Bros. Begins Exclusive Talks With Netflix; US Lobbies to Block EU Loan Plan for Ukraine
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14On today's podcast: 1) Warner Bros. Discovery Inc. has entered exclusive negotiations to sell its film and TV studios and HBO Max streaming service to Netflix Inc., according to people familiar with the discussions. Netflix is offering a $5 billion breakup fee if regulators don’t approve the deal, said the people, who asked to not be identified bec…
…
continue reading
1
Musk says new Tesla software allows texting and driving, which is illegal in most states; plus, Feds ask Waymo about robotaxis repeatedly passing school buses in Austin
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Texting while driving is banned in nearly every state, even with the use of advanced driver assistance systems like Tesla's Full Self-Driving (Supervised) software. Also, the agency already opened an investigation in October over Waymo's performance around school buses. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Scaling Laws: Caleb Withers on the Cybersecurity Frontier in the Age of AI
49:00
49:00
Play later
Play later
Lists
Like
Liked
49:00Caleb Withers, a researcher at the Center for a New American Security, joins Kevin Frazier, the AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discuss how frontier models shift the balance in favor of attackers in cyberspace. The two discuss how labs and governments can take steps to address…
…
continue reading
1
Predator spyware, Russia blocks FaceTime, US cyber strategy coming
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you…
…
continue reading
For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. We return to a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping…
…
continue reading
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
…
continue reading
1
Shady Panda Hides For Years In Legitimate Browser Extensions: Cybersecurity Today
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13In this episode of 'Cybersecurity Today,' host Jim Love discusses several significant cybersecurity issues. Highlights include a maximum severity vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182), a recently patched Windows shortcut flaw by Microsoft, and new attacks using the Evilginx phishing platform in schools. Additi…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
1
3509: What AWS re:Invent Revealed About the Acceleration of Agentic AI
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45Did you ever walk into a conference session thinking you were ready for the week, only to realise the announcements were coming so fast that you almost needed an agent of your own to keep up? That was the mood across Las Vegas, and it was the backdrop for my conversation with Madhu Parthasarathy, the general manager for Agent Core at AWS. He has sp…
…
continue reading
1
Amazon rolls out a find-a-scene Alexa+ feature for Prime Video
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35The Fire TV tool can understand quotes, character names and scene descriptions and take you to that point of a movie. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Engadget
…
continue reading
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney…
…
continue reading
1
Why a former federal judge calls Trump ‘uniquely dangerous’
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26Mark Wolf spent four decades as a judge on the federal bench after being appointed by President Ronald Reagan. But Wolf recently resigned, citing the Trump administration’s “deeply disturbing assault" on the rule of law.By WBUR
…
continue reading
1
California’s ban on self-driving trucks could soon be over; also, Amazon may drop USPS and build a competing service
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Revised rules in California would allow self-driving trucks to test on public highways. The rules also close a loophole allowing police to issue tickets for driverless vehicles. Also, Amazon is the USPS' biggest customer, and the e-commerce giant's potential break from the postal agency comes as the two sides are negotiating a new deal. Learn more …
…
continue reading
Send us a text Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire. The quote came to mind in preparing for my conversation with Tim Chase, P…
…
continue reading
1
The Undetected. Espionage and Spies.(Part 2)
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07Question? Text our Studio direct. Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on…
…
continue reading
1
You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31This story was originally published on HackerNoon at: https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down. A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
1
Market Doubts Hassett Can Deliver in Fed; Bessent Under Discussion to Also Lead NEC
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54On today's podcast: 1) Kevin Hassett may not have the ability to deliver the rapid pace of interest rate cuts President Trump would like, even if he is approved as the next Federal Reserve Chair, said Gregory Peters, co-chief investment officer at PGIM Fixed Income. Peters made the remarks amid rising talk that Hassett, the White House National Eco…
…
continue reading
1
Andy Jassy says Amazon’s Nvidia competitor chip is already a multi-billion-dollar business
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Can any company, big or small, really topple Nvidia's AI chip dominance? Maybe not entirely but Amazon is already making big bucks trying. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading
1
Lawfare Daily: The End of New START? With John Drennan and Matthew Sharp
58:45
58:45
Play later
Play later
Lists
Like
Liked
58:45New START, the last bilateral nuclear arms control treaty between the United States and Russia, will expire in February 2026 if Washington and Moscow do not reach an understanding on its extension—as they have signaled they are interested to do. What would the end of New START mean for U.S.-Russia relations and the arms control architecture that ha…
…
continue reading