Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Every weekday, John Curley has an irreverent take on the news. From big stories to small ones, they all get the Curley treatment and you’ll be left laughing and thinking about the headlines in different way.
…
continue reading
Every day, a team of AIs deliver simple, straightforward updates from the world of artificial intelligence.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
Motley Fool Money is a daily podcast for stock investors. Weekday episodes offer a long-term perspective on business news with The Motley Fool's investment analysts. Weekend shows are a mix of investing classes and longer-form interviews. The show is hosted by Dylan Lewis, Ricky Mulvey, and Mary Long.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet.
…
continue reading
💡 Get your daily fix of innovation, gadgets, AI, cybersecurity, and the tech shaping tomorrow. Technology Daily keeps you in the loop with smart, snappy updates—perfect for busy founders, engineers, and curious minds alike.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Join Downtown Josh Brown, Michael Batnick, and a rotation of their friends every Tuesday and Friday for expert insight and hot takes on the latest in business and investing. See our disclosures here - https://ritholtzwealth.com/podcast-youtube-disclosures/
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
AI,AI, CPaaS, CCaaS, UCaaS, Mobility, Security. Reporting on how the world communicates.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Every day, a team of AIs deliver simple, straightforward updates from the world of startups.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Lee Frazier and his team of experts bring you the latest in Cybersecurity, IT, and HIPAA HITECH news along with segments each episode covering their views and advice on topics such as mobile devices, PC recommendations, compliance issues such as HIPAA HITECH and PCI, cybersafety, emerging technologies, IT for healthcare, and listener questions. One episode each month is followed up with a free live webinar where podcast listeners/viewers can get more in depth info on the topic and bring thei ...
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
…
continue reading
So, you’re a new lawyer or you’re new to practicing solo. You’ve got your game plan. Now what? First, know that you’re not ‘alone. It’s the fastest growing segment of the legal profession. Welcome to New Solo here on the Legal Talk Network, where you’ll learn a lot about practicing law. SOLO!
…
continue reading

1
Episode 206 - Record US Cybercrime Losses, Spain Portugal Massive Power Outage, Cybersecurity CEO Hacks Customer, RSA 2025 Recap, Disney Menu Hack
59:10
59:10
Play later
Play later
Lists
Like
Liked
59:10Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Disne…
…
continue reading

1
“It’s Not the Flashy Vulnerabilities—It’s the Ones You Miss”: SonicWall’s Douglas McKee on Prioritizing Cybersecurity at RSA, Podcast
SAN FRANCISCO — RSA Conference 2025 “Sixty percent of the attacks we’re tracking target low-profile vulnerabilities—things like privilege escalation and security bypasses, not the headline-making zero days,” says Douglas McKee, Executive Director of Threat Research at SonicWall. Speaking live from the show floor at RSA 2025, McKee outlined how Soni…
…
continue reading

1
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…
…
continue reading

1
Lawfare Daily: Alexis Loeb on Kleptocracy and National Security
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55In her recent Lawfare article, Alexis Loeb—a former deputy chief of the Jan. 6 Capitol Siege Section at the U.S. Department of Justice and a current partner at Farella, Braun, and Martel—discussed Attorney General Pam Bondi’s memo dismantling the Kleptocracy Asset Recovery Initiative. On today’s episode, Loeb joined Lawfare Associate Editor Olivia …
…
continue reading

1
Nvidia’s AI Leap, OpenAI’s Model Reversal, and Anthropic’s Science Boost
12:23
12:23
Play later
Play later
Lists
Like
Liked
12:23Explore Nvidia's 'Embodied Intelligence' initiative showcasing AI's real-world applications, OpenAI's response to GPT-4o user feedback, and Anthropic's 'AI for Science Program' offering researchers free API access. Join us for these stories and more on Simply News Radio. Sources: https://theoutpost.ai/news-story/nvidia-unveils-ai-breakthroughs-for-…
…
continue reading

1
AI Startups Secure Major Funding: Fintech, Fashion, and Debugging Innovations
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45In today's episode, we explore the latest funding successes in the AI startup world. Bondway.ai raises $6.4 million, highlighting the fintech sector's growing reliance on AI solutions. Phia, a fashion tech startup, secures $500,000 in angel funding, showcasing the demand for innovative shopping tools. Meanwhile, Lightrun, an Israeli startup, lands …
…
continue reading

1
Congress challenges CISA cuts, Texas school breached, NSO pays WhatsApp
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32Congress challenges Noem over proposed CISA cuts Texas school district breach impacts over 47,000 people NSO Group to pay WhatsApp $167 million in damages Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and r…
…
continue reading

1
6 Year Old Sleeper Attack Uncovered, Fake Bank Draft Scam, and Signal Tool Breach
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56In this episode of Cybersecurity Today, host Jim Love delves into a range of alarming cyber incidents. A six-year sleeper supply chain attack has compromised thousands of e-commerce websites, exploiting vulnerabilities in Magento extensions from vendors Tigren, Meetanshi, and Magesolution. Russian-controlled open-source tool Easy JSON raises scruti…
…
continue reading

1
Inside the 2025 Cybersecurity Threat Report - Ep 148
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37In this episode Senior Security Analyst Tyler Moffitt unpacks the 2025 OpenText Cybersecurity Threat Report. He dives into alarming shifts like a 28% spike in malware infections, the relentless resilience of ransomware group LockBit, and the surge of AI-enhanced phishing campaigns. Tyler breaks down why old-school malware tactics still dominate, ho…
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
Risky Bulletin: NSO ordered to pay Meta $167 million in WhatsApp lawsuit
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37NSO Group ordered to pay Meta $167 million dollars, the White House tells N-S-A to cut 8% of its civilian staff, the US sanctions a Myanmar militia group leader for cyber scams, and one of the Nomad Bridge hackers gets arrested in Israel. Show notes
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
Hour 4: She felt like life had no meaning — so she started screaming like a gull
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:046pm: Guest - Johnathan Choe on the Portland State and University of WA protests // UW protest, occupation end with 30 arrests // Mother's Day - The mysterious history of John's Mom // The Gingerbread Man story // She felt like life had no meaning — so she started screaming like a gull
…
continue reading
5pm: Guest - David The Mailbox Guy - Live, and Nude, from Denny Blaine Park // SPD “raids” Denny Blaine Park // Today in History // 1937 - The Hindenburg Disaster // Letters
…
continue reading

1
Hour 2: Carney, Meeting Trump, Says Canada Isn’t for Sale
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:184pm: Carney, Meeting Trump, Says Canada Isn’t for Sale // Trump Confirms: “Yes, I Will Donate My Salary Again” // The Obamas Aren’t Going to Rescue the Democrats // Cle Elum’s Daily Debt Counter is Live
…
continue reading

1
Hour 1: UW protest, occupation end with 30 arrests
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:043pm: Guest - Johnathan Choe on the Portland State and University of WA protests // UW protest, occupation end with 30 arrests // Mother's Day - The mysterious history of John's Mom // The Gingerbread Man story // She felt like life had no meaning — so she started screaming like a gull
…
continue reading
On this TCAF Tuesday, Join Michael Batnick (Managing Partner, Ritholtz Wealth Management) and guest co-host Callie Cox (Chief Market Strategist, Ritholtz Wealth Management) for another episode of What Are Your Thoughts and see what they have to say about the biggest topics in investing and finance! This episode is sponsored by Grayscale. Learn more…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweek…
…
continue reading
“We’re turning a mandate into an operational advantage.” — Barbara Sharnak, SVP of Business Development, Relay In a wide-ranging conversation with Technology Reseller News publisher Doug Green, Barbara Sharnak, Senior Vice President of Business Development at Relay, outlines how the company is transforming frontline communication for industries tha…
…
continue reading

1
No hocus pocus—MagicINFO flaw is the real threat.
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01A critical flaw in a Samsung’s CMS is being actively exploited. President Trump’s proposed 2026 budget aims to slash funding for CISA. “ClickFix” malware targets both Windows and Linux systems through advanced social engineering. CISA warns of a critical Langflow vulnerability actively exploited in the wild. A new supply-chain attack targets Linux …
…
continue reading
When a stock trades at 600x trailing earnings and 90x sales, its investors want to see a flawless growth story. (00:21) Sanmeet Deo and Ricky Mulvey discuss: - Palantir’s impressive business results and astonishing valuation. - Celsius’s “meh” quarter. - Why DoorDash kept growing after COVID. Then, (16:10) Cynthia Stewart, Executive Director of DAR…
…
continue reading

1
💻 AI Breakthroughs, VR Access & Quantum Theory Shake-up
2:56
2:56
Play later
Play later
Lists
Like
Liked
2:56Dive into groundbreaking tech developments, including a revolutionary text-to-video AI that masters real-world physics simulation. Learn about new VR accessibility features making virtual experiences more inclusive. Explore a potential breakthrough in quantum gravity theory that could revolutionize our understanding of the universe. Also covered: E…
…
continue reading

1
Ransomware Attack Timeline: A Walkthrough of the Disruption
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Send us a text Step inside the chaos of a real ransomware attack. In this episode of CyberSound, Vancord's experts break down the timeline of a ransomware incident—from initial compromise to full recovery. Discover how threat actors move, what response steps matter most, and what it really takes to manage the disruption. This isn’t theory—this is a…
…
continue reading

1
Stuxnet to Colonial Pipeline What Have We Learned & What’s on the Horizon?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55Dino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. From his early fascination with hacking culture to leading OT security for one of the world’s largest engineering firms, Mike shares personal insights and lessons learne…
…
continue reading

1
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. In this engaging and eye-opening session, Sherri and Matt s…
…
continue reading

1
They’re Not AI Mistakes, They’re Happy Little Incidents
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner of YL Ventures. Their sponsored guest is Jadee Hanson, CISO of Vanta. In this episode: Find a partner to work with Fixing the root of burnout The limitations of human vigilance Balanci…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Idan Plotnik, Vishal Gupta - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
Lawfare Daily: Digital Forgeries, Real Felonies: Inside the TAKE IT DOWN Act
47:59
47:59
Play later
Play later
Lists
Like
Liked
47:59The TAKE IT DOWN Act is the first major U.S. federal law to squarely target non‑consensual intimate imagery (NCII) and to include a component requiring tech companies to act. Long handled via a patchwork of state laws, it criminalizes NCII at the federal level—both authentic images and AI-generated digital forgeries—and requires that platforms remo…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
Tech Giants Unveil AI Innovations: IBM, Nvidia, and Perplexity AI Lead the Charge
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55In today's episode, we explore IBM's launch of the LinuxONE 5 platform, a game-changer in enterprise AI and security. Nvidia showcases over 70 groundbreaking AI research papers, pushing the boundaries of technology across various sectors. Plus, Perplexity AI is set to challenge Google Chrome with its new Comet browser, integrating advanced AI featu…
…
continue reading

1
Innovative Startups Transforming Charity, Climate, and AI
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Explore how Bono is revolutionizing charitable giving with technology, the University of Colorado Boulder's new climate venture initiative, and Zette AI's back-to-back wins at the Startup Grind Global Conference. Discover the impact of these innovations on philanthropy, climate change, and the information economy. Sources: https://www.barchart.com/…
…
continue reading

1
Signal clones, easyjson warning, UK retail hacker
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Signal clone gets hacked Sounding the alarm on easyjson Ransomware group takes credit for UK retail attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default…
…
continue reading
Radio Free Europe was built to counter disinformation behind the Iron Curtain. Now, as the Trump administration moves to defund it, authoritarians are expected to fill the void when trusted voices disappear. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes al…
…
continue reading

1
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes al…
…
continue reading
Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
Hour 4: The World’s First Sperm Race Seemed Too Good to Be True. It Was.
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:076pm: Guest - Reggie "Smiley" Wilson - Retired King County Metro Bus Driver // Creator of SMILE! - Award Winning Customer Service Training Video // Managment rules on the Marijuana test // The World’s First Sperm Race Seemed Too Good to Be True. It Was.
…
continue reading