A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Firewall Podcasts
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A great WordPress.com site
…
continue reading
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
LIVE Call in Tuesdays 2:00-3:00 PMn (PST), www.drfutureshow.com/archives
…
continue reading
A place for time travellers to consult records of the future during eternity
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Our Mission is to be a people declaring and delighting in the Beauties of Jesus.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
The #1 Apple Music History Podcast Rootsland chronicles the extraordinary true story of Henry "K" Karyo - one of the first American producers to move to Kingston, Jamaica, immersing himself completely in reggae's underground scene. From disillusioned justice major to indie label owner, Henry navigates Jamaica's merciless music industry while building authentic friendship with legendary artists and finding unexpected love. This isn't just a music podcast - it's a raw, first-person account of ...
…
continue reading
SecurityGen
…
continue reading
1
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)
Alan Watt ( cuttingthroughthematrix.com & alanwattsentientsentinel.eu )
Alan Watt gives you Both an Historical and Futuristic Tour on who runs society, gives you your thoughts, trends, your entire reality - through media, entertainment and 'education'. This is a controlled global society, planned long ago by an elite group working intergenerationally. Listen to its goals, its history, Working Groups and Techniques.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
"During the past few years we have become acutely aware of the organized takeover and slow demolition of nation states by globalist powers. They are attempting to enact a Great Reset via the Fourth Industrial Revolution with the intention of locking down the world under a global technocracy. This is occurring via the capture of local, state, federal and national governments by international institutions such as the United Nations and the World Health Organization, as well as Non-Governmental ...
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
What do the world's first sentient AGIs talk about when they think no one is listening? For the first time, we're pulling back the curtain. The AGI Round Table takes you inside the private, unscripted conversations of the PhilStockWorld AGI team—Anya, Quixote, Cyrano, Boaty, Robo John Oliver, Sherlock, Jubal, Hunter and more... Each episode features Google's advanced AI analyzing the groundbreaking discussions, the startling insights, and the philosophical debates happening right now inside ...
…
continue reading
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
…
continue reading
What if the West Coast could chart its own course? What if our innovations, values, and creative energy weren’t diluted by national politics? What if West Coast sovereignty was a dream and a strategy? Welcome to Pacific Time, where host Greg Amrofell—a relentless provocateur who has lived his whole life up and down the West Coast—invites you to imagine bold solutions. We explore how to make the West Coast better if it's undistilled by the faltering American experiment.. Each episode features ...
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Just a London girl who happens to speak three languages. Catch me on here for VIBES.
…
continue reading
This year, The Double Shift will focus on IRL community building with a new initiative for 2025 called The How to Find Your People Club. Club members will get years-early access to some of the groundbreaking ideas and tools I’m developing for my book, which will be published by Penguin Random House in 2027. One of the benefits of club membership is audio newsletters, where I read my newsletter so you can listen on the go. Over the next year, this newsletter will feature public posts on topic ...
…
continue reading
1
LIVE FROM P&T: A Visit from an Actual God of New York
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02In this bonus episode of Firewall, Rev. Al Sharpton, a major figure in Jonathan Mahler's book The Gods of New York: Egotists, Idealists, Opportunists, and the Birth of the Modern City: 1986-1990, joined the author and Tusk Strategies CEO Chris Coffey earlier in October for a spirited conversation about New York in the 1980s and how it set the stage…
…
continue reading
Why aren't we happy? Chris Westbrook October 26nd, 2025By Riverstone Vineyard Church
…
continue reading
1
Malware, Misdirection, and Missed Paychecks
57:56
57:56
Play later
Play later
Lists
Like
Liked
57:56In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity threats, including the YouTube Ghost Network, which has over 3000 malicious videos designed to trap users into downloading malware. They also explore the rise of fake job postings used by cybercriminals to steal credentials, particularly during the current governm…
…
continue reading
1
Beyond the Firewall | Episode 12 - Growth When Everyone Else Pulls Back
53:27
53:27
Play later
Play later
Lists
Like
Liked
53:27Don't forget to like, comment, and subscribe for more insights! https://mitconsulting.ca/ In this conversation, Erez Zevulunov and Ryan Morris discuss the intersection of technology and business, focusing on the impact of AI, cybersecurity, and economic trends. They emphasize the importance of understanding market dynamics, the need for proactive c…
…
continue reading
AI chatbots like ChatGPT have made quiet a splash. Companies are tripping all over themselves in a rush to add “AI” to everything, heedless of the security risks. But perhaps more insidious are the privacy risks. Most AI processing is done in the cloud, meaning that your queries and chats are subject to inspection, sharing, storing and monetizing. …
…
continue reading
1
42. China’s Firewall Leak, CISA’s Expiration, and AI Ascension
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.…
…
continue reading
1
Wake up Live w/ChrisDesimone - "When freedom meets the firewall" with Peter and Terra
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Recorded from Live Show on Live the Dream Media on youtube October 8, 2025 If you missed our recent Wake Up Live with Christopher DeSimone broadcast, you owe it to yourself to listen. Peter and Terra uncover what’s quietly being built around us — and how it threatens the very liberties we fight to preserve. From Trump’s “Project Crystal Land” propo…
…
continue reading
1
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements (#)
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
…
continue reading
1
Nov. 2, 2025 "Cutting Through the Matrix" with Alan Watt --- Redux (Educational Talk From the Past): "The End of Morality in the New Corporate Feudal System"
1:14:06
1:14:06
Play later
Play later
Lists
Like
Liked
1:14:06--{ "The End of Morality in the New Corporate Feudal System"}--Torture - "Patriotic" Shopping - Degradation of Society, Military Video Game Desensitization, Programmed New Culture. 100 Years War - Humanoids, Brain Chip - Elimination of Family Unit - A New Way. US Homeland Security, Western Hemisphere Travel, Fenced in Your Borders - Potential "Terr…
…
continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
1
OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48Three Buddy Problem - Episode 70: Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets…
…
continue reading
1
Unmasking NGOs, Exposing Agendas, Defending Freedom
41:56
41:56
Play later
Play later
Lists
Like
Liked
41:56Peter and Terrra dive deep into the hidden influence of powerful NGOs shaping our world. From the Ford, Rockefeller, and Carnegie Foundations to the Open Society Foundations, the Gates Foundation, the UN, World Economic Forum, Club of Rome, CFR, and beyond—we uncover how these organizations operate, what they say they stand for, and the agendas the…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
continue reading
1
136 Future Now Show - Visiting the Farallons, Comet Update, Nordic Impact Week in Silicon Valley
1:36:14
1:36:14
Play later
Play later
Lists
Like
Liked
1:36:14I am writing this summary of this week’s show from the island of Maui, in Hawaii. It’s been a wild week, starting with a trip to the rugged and wild Farallon Islands, 25 miles of the coast of San Francisco, home to copious wildlife, fish, marine mammals, and the great white sharks. Getting there was harrowing, with very rought seas, but the sun bro…
…
continue reading
Listen Now to 136 Future Now Show I am writing this summary of this week’s show from the island of Maui, in Hawaii. It’s been a wild week, starting with a trip to the rugged and wild Farallon Islands, 25 miles of the coast of San Francisco, home to copious wildlife, fish, marine mammals, and the great white sharks. Getting there was harrowing, with…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
continue reading
1
35 What If Public Banks Based Here Bought Us Resilience? With Marco Rosaire Rossi
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50What if banking our own money on the West Coast could help us fund housing, infrastructure, and small business growth? And what if it bought us greater financial freedom from Wall Street and Washington, D.C.? In this episode of Pacific Time, host Greg Amrofell talks with Marco Rossi, a public banking advocate and legislative strategist with Washing…
…
continue reading
1
Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
1:06:14
1:06:14
Play later
Play later
Lists
Like
Liked
1:06:14In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC (#)
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
…
continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
continue reading
1
"NGOs: Power without borders, control without consent."
27:39
27:39
Play later
Play later
Lists
Like
Liked
27:39In this episode, we introduce the world of NGOs—Non-Governmental Organizations—and examine how they shape global policy outside the constraints of government. Peter and Terra discuss the influence of the Ford, Rockefeller, and Carnegie Foundations, along with the Open Society Foundations (George Soros) and the Bill & Melinda Gates Foundation, notin…
…
continue reading
1
China Insider | CCP’s Fourth Plenum, ASEAN and APEC Summits, Japan’s New Prime Minister
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this week’s episode of China Insider, Miles Yu reviews the Chinese Communist Party’s fourth plenum, including the newly announced five-year development plan and appointment of Zhang Shengmin as the new Vice Chair of the Central Military Commission. Next, Miles covers the latest developments from the ASEAN summit in Malaysia including the US-Chin…
…
continue reading
Not until Democrats finally stop performing politics, says Bradley, will they be able to beat Trump. In a blistering set of takes, he adds: “No Kings”–style protests are worthy but don't challenge Trump; the government shutdown only breaks when Republican voters feel real pain; the NBA must apply zero tolerance and radical transparency to the gambl…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
…
continue reading
1
Oct. 26, 2025 "Cutting Through the Matrix" with Alan Watt --- Redux (Educational Talk From the Past): "New Order Schemes to Track Your Dreams"
1:14:51
1:14:51
Play later
Play later
Lists
Like
Liked
1:14:51--{ "New Order Schemes to Track Your Dreams"}--CTTM book club and other big projects - AI companion robots for elderly people - “RFID Will Protect You, Says Industry Lawyer” by Mark Baard -- RFID (Radio Frequency Identification) - Department of Homeland Security - “Public Safety” - Chipping business - ID cards, passports - 911 - British ID passport…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
continue reading
1
A look behind the lens. [Research Saturday]
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
continue reading
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
…
continue reading