Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Data Breaches Podcasts
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Guardian columnist John Harris, political editor Pippa Crerar, and political correspondent Kiran Stacey analyse the week's politics news
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Daily Drive is a daily podcast series hosted by Automotive News Executive Editor Jamie Butters and Kellen Walker. We speak with industry experts, insiders and Automotive News reporters about events and trends impacting and reshaping the automotive industry.Automotive News is the leading source of news, data and understanding for the auto industry's decision-makers. Learn more at autonews.com.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Connecting you to the most talked-about stories of the day in Nova Scotia. Hosted by Portia Clark.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
The Podcast of Brushbeater.org, dedicated to training in small group communications, operations and intelligence tradecraft with a splash of current events.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Our panel of Paris-based journalists review the week's international news: the stories that made the headlines and also those you may have missed! Join us every Friday at 7:10pm Paris time.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Cybersecurity and Hacking related news like Hacks, Bugs, Vulnerabilities, Data Breaches of the last 7 days on every Wednesday.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Each weekday morning we bring you the tech news you need today, and then in the afternoon we showcase stories about the technology, science, and culture that will influence tomorrow, all brought to you by Engadget.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The Legal Face-off Podcast from WGN Plus
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Who knew rich people committed crime? Not the American justice system! Join Chicago based comedians Nina Kern and Kishan Batcheldor as they talk some of the most prolific crimes committed by the wealthy. Checkout our Merch!: https://www.teepublic.com/stores/white-collars-red-hands?ref_id=23248
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
SNL meets TMZ but for B2B marketing. Hosted by Tas Bober and Tim Davidson, Notorious B2B is where LinkedIn drama, marketing chaos, and corporate cringe get the airtime they deserve. We talk about the stuff no one else wants to say out loud: shady campaigns, unhinged posts, comment bait, teardown culture, and all the things making B2B feel more like reality TV. This is not thought leadership. This is Notorious B2B.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
SC Media and NowSecure are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The American Health Law Association (AHLA) is the largest nonprofit, nonpartisan educational organization devoted to legal issues in the health care field. AHLA's Speaking of Health Law podcasts offer thoughtful analysis and insightful commentary on the legal and policy issues affecting the American health care system.
…
continue reading
This Audio Course is your complete audio-first companion to the CIPP/US certification. Across structured episodes, it breaks down U.S. privacy law from federal and state frameworks to workplace rules and international overlaps, all aligned with the official IAPP Body of Knowledge. You’ll get guided walkthroughs of statutes, enforcement themes, case law, and key regulatory agencies, plus study strategies, glossary deep dives, and exam skills to build lasting confidence. Designed for on-the-go ...
…
continue reading
Want to stay in the loop but don’t have time to scroll through endless headlines? This podcast has your back. Each week, we break down the hottest topics — from news and pop culture to tech trends and viral moments — and give you just what you need to sound informed, interesting, and maybe even a little wiser in your next conversation. No fluff, no noise, just what matters (with a few laughs along the way). Subscribe and stay in the conversation.
…
continue reading
Podcasts summarising important cases in privacy and data law in the UK and Europe.
…
continue reading

1
Cybercrime News For Sep. 30, 2025. Harrods Data Breach Affects 500K Customers. WCYB Digital Radio.
2:34
2:34
Play later
Play later
Lists
Like
Liked
2:34The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Microsoft blocks AI code, Breach hits WestJet, Harrods suffers new data incident
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02AI-generated code used in phishing campaign blocked by Microsoft WestJet notifies American consumers of data breach Ukrainian cops spoofed in fileless phishing attacks on Kyiv Huge thanks to our sponsor, Nudge Security AI tools have spread to every corner of your tech stack, which is great for innovation, but not so great for data governance. That'…
…
continue reading

1
Harrods Data Breach Exposes Customer Details in Third-Party Hack
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Britain is facing a troubling wave of cyberattacks that has shaken some of its most high-profile organizations. Harrods, the world-renowned luxury retailer, confirmed that customer names and contact details were compromised after attackers infiltrated a third-party vendor’s system. While account passwords and payment data were spared, the breach hi…
…
continue reading

1
Massive data breach: what information about you is at risk?
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11Summary:The episode by Andrés Díaz explains that mass data breaches expose millions of records and can dramatically affect your life, including identity theft and data resale on the dark web. Breaches arise from a mix of human and technical weaknesses, such as misconfigured systems, insecure third parties, phishing, and malware. Regulatory efforts …
…
continue reading

1
Stellantis confirms data breach involving customers' contact information
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30A hacker group claimed to have obtained 18 million records. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Engadget
…
continue reading

1
Sept. 22, 2025 | Stellantis data breach; Larry Dominique talks China threats
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Stellantis is the latest auto company to suffer a data breach. Jeep cancels the Gladiator 4xe. Plus, Larry Dominique, president of LD Management Consulting, talks about automaker tech challenges amid increasing threats from China.By Automotive News
…
continue reading

1
China Insider | Gen Z Protests in Nepal, US-China Trade Talks, and China's Great Firewall Data Breach
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05In this week’s episode of China Insider, Miles Yu covers the recent anti-corruption movement and Gen Z protests that ousted former Prime Minister Oli and government officials, and examine China's role in the transition to the new interim government. Next, Miles breaks down the latest from US-China trade talks in Madrid, as the US seeks to advance t…
…
continue reading

1
China-linked group linked to new malware, 2024 VMware zero-day still exploited, iOS fixes a bevy of glitches
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28China-Linked Group Hits Governments With Stealth Malware Chinese hackers exploit VMware zero-day since October 2024 Apple's iOS fixes a bevy of glitches Huge thanks to our sponsor, Nudge Security The SaaS supply chain is a hot mesh. As your workforce introduces new SaaS apps and integrations, hidden pathways are created that attackers can exploit t…
…
continue reading
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the…
…
continue reading

1
Asahi Brewery Cyberattack Halts Domestic Operations Across Japan
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07Asahi Group Holdings, Ltd.—the brewer behind some of the world’s most iconic beers, including Peroni and Grolsch—has been hit by a crippling cyberattack that froze its Japan-based operations. Ordering and shipping have been suspended, customer call centers and service desks are offline, and the company has been forced into damage control. While Asa…
…
continue reading

1
Akira Ransomware Exploits SonicWall Flaw with Record-Breaking Speed
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58The Akira ransomware group has once again raised the stakes in cybercrime by exploiting a critical SonicWall vulnerability—CVE-2024-40766—to infiltrate corporate networks through SSL VPN accounts, even those secured with one-time password multi-factor authentication. Once inside, Akira’s affiliates execute one of the most dangerous tactics in moder…
…
continue reading

1
Microsoft is trying to make 'vibe working' a thing
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06The company has released new tools for AI-powered workflows in its Office products. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Engadget
…
continue reading

1
Database Security. Defending Against Modern Cyber Threats & More. Terry Ray, Varonis.
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55Terry Ray is the Vice President of Product Strategy at Varonis. In this episode, he joins host Paul John Spaulding to discuss database security, including defense against modern cyber threats, risks associated with over-permissioned users and applications, and more. This episode is brought to you by Varonis, whose AI-powered data security platform …
…
continue reading

1
Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04A new cybersecurity startup with an infamous name attached is making headlines. SafeHill—formerly known as Tacticly—has secured $2.6 million in pre-seed funding to accelerate the development of its continuous threat exposure management (CTEM) platform, SecureIQ. Designed to overcome the shortcomings of traditional, point-in-time penetration testing…
…
continue reading

1
Starmer takes the gloves off in fight with Farage
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41The UK prime minister has used his conference speech to take aim at Nigel Farage, warning that Reform UK offers only ‘division and decline’ while promising ‘renewal’ and ‘decency’ under Labour. John Harris, Pippa Crerar and Kiran Stacey talk through the speech and ask if it could help to turn things around for Keir Starmer. Help support our indepen…
…
continue reading

1
Sept. 30, 2025 | End of electric vehicle tax credits; EV Politics Project’s Mike Murphy
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34Federal electric vehicle tax credits expire at midnight. General Motors and Ford are using their financing arms to offer the federal incentive beyond its expiration. Plus, EV Politics Project founder Mike Murphy talks about the state of electrification as federal support evaporates.By Automotive News
…
continue reading

1
Jaguar Land Rover Cyberattack Fallout: £1.5B UK Bailout Sparks Fears of More Attacks
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Jaguar Land Rover (JLR), one of the UK’s largest exporters and a key anchor of the nation’s automotive supply chain, has been brought to the brink by a devastating cyberattack. With production lines halted, digital operations crippled, and a data breach confirmed, the UK government stepped in with a massive £1.5 billion support package to stabilize…
…
continue reading

1
Cybercrime Wire For Sep. 30, 2025. Cyberattack Hits Japanese Beer Giant Asahi. WCYB Digital Radio.
1:13
1:13
Play later
Play later
Lists
Like
Liked
1:13The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
CISA’s Sunset Clause: What Happens if America’s Cyber Threat Shield Expires?
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00The Cybersecurity Information Sharing Act (CISA), first enacted in 2015, is facing a critical expiration deadline in September 2025. Without reauthorization, the law that shields companies from liability when sharing cyber threat data with the federal government and industry peers will vanish, leaving organizations exposed to lawsuits and reputatio…
…
continue reading

1
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we’re joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you. 🕵️♀️🔐 In Crash Course, we break down ident…
…
continue reading

1
Alphabet will pay $22 million to settle President Trump’s YouTube lawsuit, OpenAI will reportedly release a TikTok-like social app, and Tile trackers reportedly have a security flaw
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16-(00:39) Alphabet will pay President Donald Trump $22 million as part of a settlement in a class action lawsuit brought against the company over the suspension of various YouTube accounts following the January 6 riot at the US capitol. -(02:34) In a development that should surprise no one, OpenAI is preparing to release a standalone social app powe…
…
continue reading

1
China Insider | Xi Jinping in Xinjiang, CCP Coercion Against Taiwan, China's Role in Russia-Ukraine War
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57In this week’s episode of China Insider, Miles Yu provides a summary of Xi Jinping's recent trip to Xinjiang to commemorate the seventieth anniversary of the region's founding, and the significance of this visit in contrast to Beijing's ongoing persecution of the Uyghur people. Next, Miles unpacks the latest developments within the CCP's influence …
…
continue reading
This is today’s cyber news for 2025-09-29. A busy slate led by Asahi’s nationwide logistics pause after a cyberattack, a Harrods third-party breach affecting hundreds of thousands of shoppers, and the UK’s rare £1.5B loan guarantee to steady Jaguar Land Rover after a crippling incident. We cover edge-device pressure with Akira ransomware exploiting…
…
continue reading

1
Know Your Audit! Operational Considerations for Every Kind of Audit
48:17
48:17
Play later
Play later
Lists
Like
Liked
48:17R. Ross Burris, Shareholder, Polsinelli, and Lindsey L. Lonergan, Senior Associate General Counsel, Wellspan Health, discuss current trends and developments related to audits and proactive strategies for dealing with audits. They cover issues related to CMS claim review programs, the increase in commercial audits versus government payer audits, art…
…
continue reading

1
Crypto Theft on macOS: XCSSET Malware Swaps Wallet Addresses in Real Time
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49A new and more dangerous variant of the XCSSET macOS malware has been uncovered by Microsoft, revealing an expanded arsenal of capabilities aimed at financial theft and deeper system compromise. Originally known for spreading through malicious Xcode projects, XCSSET has steadily evolved into one of the most persistent malware families targeting App…
…
continue reading

1
Nine High-Severity Vulnerabilities Expose Cognex Legacy Cameras to Cyber Threats
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21Cybersecurity researchers at Nozomi Networks have uncovered nine high-severity vulnerabilities in several older models of Cognex industrial cameras, including the widely deployed In-Sight 2000, 7000, 8000, and 9000 series. These machine vision systems are vital for modern manufacturing—guiding robots, inspecting products, and ensuring quality contr…
…
continue reading

1
CSRMC, LockBit 5.0 & Phishing Fallout - Brutally Honest Security #2
2:33:09
2:33:09
Play later
Play later
Lists
Like
Liked
2:33:09In this episode of Brutally Honest Security, Eric Taylor tears into the week’s most critical and pulse-raising cybersecurity developments — no fluff, just facts and blunt insight. Episode Headlines & Links: 👉 How the newly rebranded Department of War is replacing legacy frameworks with its Cybersecurity Risk Management Construct (CSRMC) - shifting …
…
continue reading

1
Apple reportedly made a ChatGPT-clone to test Siri's new capabilities
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31Plus, Apple is reportedly nearing production for its latest M5-powered MacBooks. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Engadget
…
continue reading

1
The Power of Threat Intelligence. Fraud Prevention & Integrating CTI. Shawn Loveland, Resecurity.
9:33
9:33
Play later
Play later
Lists
Like
Liked
9:33Shawn Loveland is the Chief Operating Officer of Resecurity. In this episode, he joins host Paul John Spaulding to discuss cyber threat intelligence (CTI) and how it differs from traditional fraud monitoring, as well as why organizations should integrate it across their businesses, the technology's future as AI evolves, and more. The Power of Threa…
…
continue reading

1
Microsoft Cuts Services to Israeli Military Unit After Surveillance Revelations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Microsoft has taken the unprecedented step of cutting off services to an Israeli military unit after internal and external investigations revealed its cloud and AI products were being used for mass surveillance of Palestinians in Gaza and the West Bank. This dramatic reversal came only after sustained reporting by The Associated Press and The Guard…
…
continue reading

1
Sept. 29, 2025 | Market resilience about to be tested; JLR restarts some production
23:31
23:31
Play later
Play later
Lists
Like
Liked
23:31Experts say they expect tariffs, expiring EV tax credits and other factors to hamper affordability in the coming months. JLR starts a phased production restart after a recent cyberattack. Plus, EVs are expected to buoy third-quarter sales results.By Automotive News
…
continue reading
Pippa Crerar and Kiran Stacey sit down with the mayor of Greater Manchester live at the Labour party conference in Liverpool. Help support our independent journalism at theguardian.com/politicspodBy The Guardian
…
continue reading

1
Ghana, Senegal, Ivory Coast at the Center of Interpol’s Multi-Nation Cybercrime Takedown
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23Interpol has announced the results of a sweeping cybercrime operation across 14 African nations, leading to the arrest of 260 individuals behind romance scams and sextortion schemes. The crackdown, conducted in July and August, exposed the alarming scale of digital exploitation sweeping the continent. Victims—more than 1,400 in total—were deceived,…
…
continue reading
Please follow us on YouTube! Want episodes a week early? Consider becoming a Patreon sponsor of the DefSec podcast here. Here are links to the stories we talked about this week: https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/ https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/…
…
continue reading

1
Cybercrime Wire For Sep. 29, 2025. Ransomware Attack Hits Union County In Ohio. WCYB Digital Radio.
1:16
1:16
Play later
Play later
Lists
Like
Liked
1:16The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Cybercrime News For Sep. 29, 2025. Microsoft Cuts Cloud to Israel. WCYB Digital Radio.
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Apple may be nearing production for its M5 MacBooks, EA may go private with help from Silver Lake and Saudi Arabia, and Meta wants to become the Android of robotics
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24-According to Bloomberg’s Mark Gurman, the latest Apple silicon is about to hit the assembly lines. In the latest Power On newsletter, Gurman said that Apple "is nearing mass production of its next MacBook Pros, MacBook Airs and two new Mac monitors." Gurman added that these upgraded products are scheduled for release sometime between the end of th…
…
continue reading
This is today’s cyber news for 2025-09-29. Ransomware, zero-days, and persistent backdoors dominated the headlines, showing just how wide the attack surface has become. Medusa claims to have stolen more than 800 gigabytes of Comcast data and is demanding $1.2 million in extortion. Akira continues to find ways around SonicWall VPN multi-factor authe…
…
continue reading

1
Dutch espionage arrest, DOD risk management framework, Oyster malvertising
8:00
8:00
Play later
Play later
Lists
Like
Liked
8:00Dutch teenagers arrested for attempted espionage for Russia DoD announces replacement for risk management framework Fake Microsoft Teams installers deliver Oyster malware Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing.…
…
continue reading
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can attack multiple platforms simultaneously, and a critical vulnerability…
…
continue reading

1
Sept. 28, 2025 | Bonus Episode: Former Congressman Mike Rogers Part 2
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44In this second and final part of Molly Boigon’s interview with U.S. Senate Candidate Mike Rogers, the former Republican Congressman from Michigan talks about the elimination of federal tax credits for EVs, funding for battery research and more. Listen to Part 1 of the interview here: What JLR production shutdown means for dealers - Automotive News…
…
continue reading

1
Sept. 27, 2025 | Weekend Drive: Cyberattack fallout for Stellantis, JLR
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39Automotive News’ Larry P. Vellequette and Richard Truett discuss the biggest news of the past week, including fallout from cyberattacks against JLR and Stellantis, the brewing battle over the EPA’s emissions rules and more.By Automotive News
…
continue reading

1
Cybercrime Wire For Sep. 27-28, 2025. Weekend Update. WCYB Digital Radio.
1:04
1:04
Play later
Play later
Lists
Like
Liked
1:04The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
The Complex Landscape of AI and Cybersecurity
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58Navigating the Complex Landscape of AI and Cybersecurity: A Conversation with Rob T. Lee In this weekend edition of Cybersecurity Today, host Jim Love interviews Rob T. Lee, the Chief AI Officer and Chief of Research at the SANS Institute. They discuss the intersection of AI, education, and security, highlighting the dual nature of AI as both a tra…
…
continue reading