About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Decrypts Podcasts
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
We highlight the people, products, and protocols shaping the future of crypto, DeFi, and web3. Your hosts, Matthew Howells-Barby and Austin Knight, will take you on a journey of decrypting the various concepts related to blockchain and web3 technology, explaining them in a language that everyone can understand.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
A project for Mrs. Oxenfeld and Mrs. LaFave. Made by Collin, Connor, and Bejorn. Cover art photo provided by Luca Bravo on Unsplash: https://unsplash.com/@lucabravo
…
continue reading
gm! Host Stacy Elliott and other Decrypt journalists bring you candid deep-dive conversations with the biggest names in crypto. Get schooled on the latest in Bitcoin, Ethereum, DeFi, NFTs, DAOs, Metaverse, and all things Web3 culture. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related. With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, ...
…
continue reading
Talking Success: Igniting the Global FinTech Revolution is a riveting podcast powered by titc.io (formally TalentintheCloud) with a laser focus on FinTech. Your host, Darren Franks, takes you on an exhilarating journey, engaging with titans of the industry – the visionaries who are CEOs, Founders, Investors, and Leaders shaping the FinTech landscape - with a special nod to FinTechs in Africa. Immerse yourself in the pulsating heart of the FinTech sector as we unravel its secrets, complexitie ...
…
continue reading
解密风云是由BSN国际团队打造的一档深度解析中国区块链、NFT、元宇宙行业政策、行业发展现状及未来趋势的音频节目。本节目主讲人为何亦凡先生,每期将邀请国内外相关领域的专家进行深度对谈。本节目将不定期更新,欢迎海外听众(包括大量华语人群)了解中国监管,获得准确的信息。 “China Decrypted” is a monthly podcast produced by BSN international team to deeply analyse China’s policies on the blockchain, NFT, and Metaverse, as well as industry development status, and future trends. Our host is Mr. Yifan He, CEO of Red Date Technology and Executive Director of BSN Development Association. Each episode will invite an expert worldwide in ...
…
continue reading
Welcome to Decrypted, Ars Technica's weekly podcast that follows TV shows like Mr. Robot and Westworld. We'll be diving into the shows in a way only Ars can—which is to say it'll be thorough, we'll talk with experts, and no detail is too minute or nerdy. Mr. Robot S2 starts 7/13/16. Westworld starts 10/2/16.
…
continue reading
Foundering is an award-winning, serialized podcast from the journalists at Bloomberg Technology. Each season, Foundering brings you inside a different high-stakes drama from the technology industry, where its companies are wielding unprecedented capital and power.
…
continue reading
Two college students decrypt the world through the lens of their unique perspectives and experiences from pop culture to insane stories. Grab a drink, relax and joins us in our bubble.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
There are times where we want to decrypt our lives and make it easier and simpler. We all have our ways to sort things out. Some prefer to listen while some wants to be heard. Let's Decipher is a podcast where you would get to listen to a very raw concoction of mind and heart. It is about decoding emotions practically, books, writings and a lot more related life's incidents. It would be enlightening, informal, organic and fun. So, tune for the thought provoking podcasts coming your way.
…
continue reading
Enter the woods with NO BOOK CLUB: A YELLOWJACKETS PODCAST. Your hosts Matt Latham, Kurt North & A. J. Black deep dive into Showtime's Yellowjackets one episode at a time, with some specials along the way, as they try and decrypt the mystery of a plane crash, a missing football team, and the 90s teenager... A proud part of the Film Stories Podcast Network: www.filmstories.co.uk
…
continue reading
We are Princess and The Big Blue and this is our podcast where we talk about all things that interest us. We decided to start with the subject: Anarchism. When we met The Big Blue was surprised to hear that he considered himself to be an Anarchist, this led to many conversations over the years about anarchism which have been quite enlightening. Over the coming weeks we will delve into some topics on this subject which we hope will decrypt this way of thinking and hopefully inspire a few peop ...
…
continue reading
A podcast for future thinkers.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
What would a world illuminated with magical experiences look like, rather feel like? Well, having envisioned it, I curated this customer experience podcast CX...Oh! to help people serve better and concoct experiences that are memorably superlative in nature. Join me, Supriya Sharma, your fond host in making it a reality! Each episode contains didactic information to inspire you to capitalise on the experience ecosystem and sprinkle stardust in your profession, personal life, and community.
…
continue reading
Author Rose Sandy discusses books, tech, historical mysteries, espionage and life. More at rosesandy.com
…
continue reading
TIME Senior Correspondent Charlotte Alter hosts candid conversations with the people who shape the world, about the forces that shape them. Tune in each Thursday to meet TIME's Person of the Week.
…
continue reading
In TechMD we delve into the ever-evolving world of healthcare technology. Join us as we explore the latest trends, from AI-powered diagnostics to wearable health trackers. We interview industry leaders, unpack complex topics, and discuss how technology is transforming patient care, empowering individuals, and shaping the future of medicine. Tune in for insightful conversations, practical applications, and thought-provoking discussions that will keep you informed and engaged.
…
continue reading
Bitcoin groundbreakers share personal stories of how Bitcoin is changing lives for the better. Host Mauricio Di Bartolomeo, co-founder and CSO of Ledn, speaks with leading Bitcoin voices, entrepreneurs, and human rights advocates to hear their unique journey and practical real-world examples of how Bitcoin has made a positive impact in their lives. Brought to you by Ledn, a leading financial services company built for Bitcoin & digital assets. Ledn offers a suite of lending, saving and tradi ...
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading

4
Monetize Your Mindset - Create Finacial Security Monetize what You Already Know
Bart Merrell - International Entrepreneur
Bart Merrell from Monetize your mindset shares ideas and talks with entrepreneurs that have multiple streams of income. Discover how you can have multiple streams of income too by turning the things you are already doing into a stream of income whether you like doing those things are not. We ask these three questions: What do you like to do? What do you need to do? What are you already doing? Let's monetize it. The goal here is to create Financial Security by monetizing what you already know ...
…
continue reading
Inspired by the latest educational platform in the tax and financial industries, we bring to you the Pilla Tax Academy Podcast! This podcast was specifically created for those that are hungry for information that is not common knowledge to nearly every person in the USA. Whether it is learning how to manage a small business, understanding the importance of mastering your taxes, or tax professional education and resources, this is the place for you. Founded by the world’s foremost authority o ...
…
continue reading
In this episode, Matt Howells-Barby and Austin Knight discuss the recent Fed rate cuts and their implications for the crypto and equity markets. They delve into the dot plot's insights, the SEC's easing of ETF regulations, and the overall market sentiment regarding valuations and investor behavior. The conversation highlights the bullish outlook fo…
…
continue reading
Today we are joined by Rebecca Krauthamer, Stanford Quantum Computing Researcher and CEO of QuSecure, to discuss the National Quantum Cybersecurity Migration Strategy Act. Ben has the story of a new California bill regulating AI. Dave's got the story of the controversial technology transfer from the US to the UAE. While this show covers legal topi…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading
Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market." Ben has the story of law enforcement agencies increasingly relying on AI to synthesize digital evidence. Dave's got the story of the Secretary of Commerce pressuring…
…
continue reading

1
SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
…
continue reading

1
SANS Stormcast Wednesday, October 1st, 2025: Cookie Auth Issues; Western Digtial Command Injection; sudo exploited;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Episode 219: 3 Ways Not to Lose Everything
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46Former federal prosecutor Tom O’Malley takes us inside the strange, high-stakes world of modern fraud—where victims are presumed guilty, families lose fortunes, and the fight against global crime rings starts at home. Three lessons that could make a difference. Voting: https://vote.signalaward.com/PublicVoting?utm_campaign=signal4_finalists_finalis…
…
continue reading

1
Introducing IVF Disrupted: The Kindbody Story
1:37
1:37
Play later
Play later
Lists
Like
Liked
1:37Kindbody, one of the largest fertility companies in the US, sought to disrupt egg freezing and IVF by combining spa vibes with Silicon Valley efficiency. The startup raised millions, opened dozens of clinics, and became a billion-dollar unicorn. But its ambition came with consequences. In IVF Disrupted: The Kindbody Story, reporter Jackie Davalos t…
…
continue reading

1
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
…
continue reading

1
Building Trust in the Township Economy with Koola Capital
34:32
34:32
Play later
Play later
Lists
Like
Liked
34:32Send us a text In this episode, "Building Trust in the Township Economy with Koola Capital", of Talking Success, The Best Fintech Podcast, Darren Franks sat down with Katie Dodge, Co-Founder of Koola Capital, to talk about breaking barriers in SME financing. The informal economy, often called the township economy, is the backbone of South Africa’s …
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
…
continue reading
Send us a text MI6 Goes Dark with Recruiting Spies | Global Intelligence Weekly Wrap-Up Espionage is evolving fast — and this week’s episode of Global Intelligence Weekly Wrap-Up takes you inside the latest threats and innovations shaking the intelligence world. From MI6’s bold leap into the dark web with its Silent Courier spy recruitment portal, …
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
…
continue reading
This week, we are joined by Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab discussing Women's health apps and the legal grey zone that they create with HIPAA. Ben has the story of the potential sale of TikTok to U.S. investors. Dave's got the story of a looming deadline on renew…
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
…
continue reading

1
SANS Stormcast Wednesday, September 24th, 2025: DoS against the Analyst; GitHub Improvements; Solarwinds and Supermicro BMC vulnerabilities
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Episode 218: The Data Grift Everyone Missed
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25Every click, swipe, and post fuels the data economy. Credit cards, apps, even maps—our lives are scraped, stitched, and sold. It feels like a heist, and sometimes it is. Identity Theft Resource Center CEO Eva Casey-Velasquez insists the picture isn’t entirely bleak. This week we talk about the good, the bad, and the ugly of data brokers. Learn more…
…
continue reading

1
SANS Stormcast Tuesday, September 23rd, 2025: Ivanti EPMM Exploit; GitHub Impersonation
4:49
4:49
Play later
Play later
Lists
Like
Liked
4:49CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
…
continue reading

1
SANS Stormcast Monday, September 22nd, 2025: Odd HTTP Reuqest; GoAnywhere MFT Bug; EDR Freeze
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
…
continue reading
Send us a text Russian Spies Arrested in England | Global Intelligence Weekly Wrap Up Welcome to the Global Intelligence Weekly Wrap Up—the podcast where intelligence meets real-world events. This week, Neil Bisson, Director of the Global Intelligence Knowledge Network and a retired CSIS Intelligence Officer, takes you inside the latest development…
…
continue reading

1
SANS Stormcast Friday, September 19th, 2025: Honeypot File Analysis (@sans_edu); SonicWall Breach; DeepSeek Bias; Chrome 0-day
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
…
continue reading

1
SANS Stormcast Thursday, September 18th, 2025: DLL Hooking; Entra ID Actor Tokens; Watchguard and NVidia Patches
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
…
continue reading

1
SANS Stormcast Wednesday, September 17th, 2025: Phishing Resistants; More npm Attacks; ChatGPT MCP abuse
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading
It started with a slow roll of weird emails and phone calls. And then award-winning filmmaker Dan Sturman found himself in the crosshairs of serious hackers. With parallels to another case of mistaken identity and an assist from security expert Reuben Moretz, this week we explore bad social engineering. Learn more about your ad choices. Visit megap…
…
continue reading

1
SANS Stormcast Tuesday, September 16th, 2025: Apple Updates; Rust Phishing; Samsung 0-day
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will e…
…
continue reading

1
SANS Stormcast Monday, September 15th, 2025: More Archives; Salesforce Attacks; White Cobra; BSides Augusta
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. …
…
continue reading
Send us a text Europe Dismantles Belarus Spy Network | Global Intelligence Weekly Wrap-Up 🌍 Welcome back to the Global Intelligence Weekly Wrap-Up! This week, Neil Bisson—Director of the Global Intelligence Knowledge Network and retired CSIS Intelligence Officer—dives into espionage crackdowns, cyber aggression, and domestic extremism. 🚨 Startup Es…
…
continue reading

1
SANS Stormcast Friday, September 12th, 2025: DShield SIEM Update; Another Sonicwall Warning; Website Keystroke Logging
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.go…
…
continue reading

1
Eyes on the Rate Cut, Hyperliquid's Stablecoin, & Crypto IPO Season
44:41
44:41
Play later
Play later
Lists
Like
Liked
44:41Summary In this episode of the Decrypting Crypto podcast, hosts Matt Howells-Barby and Austin Knight share their market reactions and economic data, analyzing inflation trends and the potential for rate cuts. The conversation shifts to the rise of Hyperliquid and its upcoming stablecoin, USDH, highlighting its potential impact on the crypto market.…
…
continue reading
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As our lead analyst, Ethan shares his knowledge of law, privacy, and surveillance on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views ex…
…
continue reading

1
SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
…
continue reading

1
SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday;
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
Episode 216: Who’s Watching the Watchers?
47:14
47:14
Play later
Play later
Lists
Like
Liked
47:14Feeling watched? Join us as Vermont Attorney General Charity Clark breaks down the new reality of digital surveillance. From school apps to AI scams, we dive into how companies collect your data and how to take control of your online privacy. The war for privacy is real—and it's a fight you can't afford to lose. Learn more about your ad choices. Vi…
…
continue reading

1
SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches;
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
…
continue reading
Send us a text 🌍 This week on Global Intelligence Weekly Wrap-Up, Neil Bisson, Director of the Global Intelligence Knowledge Network and retired CSIS Intelligence Officer, breaks down one of the most alarming cyber operations in recent years: China’s Salt Typhoon. This sprawling breach has compromised telecom networks in more than 80 countries, rai…
…
continue reading

1
SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
…
continue reading
Today we are joined by Elad Schindler, Product Manager of AU10TIX, sharing some details about their free assessment tool and readiness guide to help organizations navigate child safety age assurance compliance. Ben discusses some unintended consequences of age verification laws. Dave's got a look at the government’s recent acquisition of a stake in…
…
continue reading