Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Infosec Community Podcasts
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET https://www.youtube.com/@BlackHillsInformationSecurity Brought to you by Black Hills Information Security. https://www.blackhillsinfosec.com
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation). Brought to you by the experts at Black Hills Information Security https://blackhillsinfosec.com -------------------------------------------------- About Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/ About Derek Banks - https://blackhil ...
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech. Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Tripwire's cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire's VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
1
A Live Stream From inside Lazarus Group – 2025-12-08
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! https:/…
…
continue reading
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com AI News | Episode 33 In this episode of BHIS Presents: AI Security Ops, the panel dives into the latest developments shaping the AI security landscape. From the first documented AI-orchestrated cyber-espionage campaign to polymorphic malware powered by Gemini, we…
…
continue reading
1
DOJ CISA Warn Russia Hackers Targeting Critical Infrastructure, Aeroflot Hacked Through Little-Known Vendor, Chrome Zero-Day Vulnerability Exploited, Intel AMD Processors Affected by PCIe Vulnerabilities ...
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58🎙️ DOJ CISA Warn Russia Targeting Critical Infrastructure, Chrome Zero-Day, Intel AMD PCIe Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1026: Today's episode will discuss the latest news: · Google Patches Gemini Enterprise Vulnerability Exposing Corporate Dat…
…
continue reading
1
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press In this episode of the Security Repo Podcast, Avi Press, founder and CEO of Scarf, dives deep into the evolving world of open source observability and its intersection with security. He unpacks how better visibility into software usage can inform both defen…
…
continue reading
1
Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02🎙️ Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1025: Today's episode will discuss the latest news: · Ivanti Warns of Critical Endpoint Manager Code Execution Fl…
…
continue reading
1
Burnout in Cybersecurity: Preparing Cyber Staff for the Reality, Not Just the Role
1:07:34
1:07:34
Play later
Play later
Lists
Like
Liked
1:07:34Is burnout in cybersecurity inevitable, or are we finally learning how to prevent it? Welcome to Razorwire. In this episode, I sit down with clinical traumatologist Eve Parmiter and occupational psychologist Bec McKeown to talk about what's really happening in high pressure cyber roles. This isn't about vague wellness advice or corporate tick-box e…
…
continue reading
1
Rethinking Public Health Workflows Through Automation and Governance: Why Data Modernization May Be The Key | A Conversation with Jim St. Clair | Redefining CyberSecurity with Sean Martin
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06⬥EPISODE NOTES⬥ Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal,…
…
continue reading
1
React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1024: Today's episode will discuss the latest news: · Critical Apache Tika Vulnerability Leads to XXE Injection Attacks …
…
continue reading
1
I'm Worried That We're Not Worried About the Right Worries With AI
39:56
39:56
Play later
Play later
Lists
Like
Liked
39:56All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest, Danny Jenkins, CEO, ThreatLocker. In this episode: AI for AI's sake Stop selling, start protecting Stop calling everything sophisticated Least privilege, rebra…
…
continue reading
1
US Organizations Warned of Chinese Malware Used for Long-Term Persistence, Critical React2Shell Flaw in React Next.js, New Wave of VPN Login Attempts Targets Palo Alto GlobalProtect Portals
16:04
16:04
Play later
Play later
Lists
Like
Liked
16:04🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1023: Today's episode will discuss the latest news: · Researchers Uncover 30 Flaws in AI Code Assistants and Develop…
…
continue reading
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Model Evasion Attacks | Episode 32 In this episode of BHIS Presents: AI Security Ops, the panel explores the stealthy world of model evasion attacks, where adversaries manipulate inputs to trick AI classifiers into misclassifying malicious activity as benign. Fro…
…
continue reading
1
Marquis Data Breach Impacts Over 74 US Banks, Freedom Mobile Discloses Data Breach, Retail Giant Leroy Merlin Discloses Data Breach, Arizona Attorney General Sues Chinese Online Retailer Temu
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47🎙️ Marquis Breach Hits 74+ US Banks, Freedom Mobile Data Exposed, Arizona Sues Temu Data Theft 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1022: Today's episode will discuss the latest news: · India Drops Mandate for Sanchar Saathi App Amid Privacy and Surveillanc…
…
continue reading
1
Lawmakers Want to Ban VPNs - 2025-12-01
1:02:47
1:02:47
Play later
Play later
Lists
Like
Liked
1:02:47Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Chapters and News Links (00:00) - PreShow Banter™ — The Problem With Extensions (03:10) - Lawmakers Want to Ban VPNs – BHIS - Talkin' Bout [infosec] News 2025-12-01 (03:47) - Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The P…
…
continue reading
1
Muted to Unmuted: Finding Your Voice in Cybersecurity
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37If you’ve ever felt like the odd one out in tech, this conversation will feel like oxygen. Akira joins us to share how a shy kid, bullied for being different, found sanctuary in two unlikely rooms—the choir room and the computer lab—and turned that mix of voice and logic into a career leading application security. We map the path from opera trainin…
…
continue reading
1
Decoding Threat Actor Names: Marketing, Confusion & the MITRE Solution – Jeffrey Bell
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54In this episode of the Security Repo Podcast, Jeffrey Bell, Principal Security Engineer and founder of CatchingPhish.com, discusses the confusion surrounding the naming conventions of threat actor groups across different security vendors. He explains how companies like CrowdStrike, Palo Alto, and Mandiant label the same adversaries with different n…
…
continue reading
1
North Korea Targets Crypto Exchange and IT Engineers, Penn Confirms Data Theft, Android Zero-Days Actively Exploited, 400K Secrets Exposed in Shai Hulud 2.0 Attack
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05North Korea Hacks Crypto, Android Under Attack, 400K Dev Secrets Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1021: Today's episode will discuss the latest news: · Android December patches two zero-days as CISA warns active exploitation · Iran targets Israe…
…
continue reading
1
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli ...
26:22
26:22
Play later
Play later
Lists
Like
Liked
26:22What Security Congress Reveals About the State of Cybersecurity This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioner…
…
continue reading
1
Coupang Data Breach Impacts 33.7 Million People, AI Malware Campaigns Return, $29 Million in Crypto Seized in Takedown, India Mandates Cybersecurity App, & Chinese Front Companies Exposed in Espionage ...
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25🎙️ Coupang 33.7M Data Breach, AI Malware Returns, Crypto Seized & China Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1020: Today's episode will discuss the latest news: · $29 million Bitcoin seized in crypto-mixer operation · India launches national cyberse…
…
continue reading
1
You Can't Fall Behind in AI if You Never Start
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is John Barrow, CISO, JB Poindexter & Co. In this episode: Building unicorns, not hunting them Cold War frameworks for modern threats Trading dollars for stories Mirror, mirror on th…
…
continue reading
1
OpenAI User Data Exposed in Mixpanel Hack, French Soccer Federation Hit by Major Breaches, Comcast Fined $15M After Vendor Leak, Weaponized Google Meet Malware Spreads
19:21
19:21
Play later
Play later
Lists
Like
Liked
19:21AI Platforms Hacked, French Soccer & Asahi Breaches, Comcast Fined $15M 💥 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1019: Today's episode will discuss the latest news: · Gainsight warns of exposed Salesforce application data · Weaponized Google Meet campaign spr…
…
continue reading
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Data Poisoning Attacks | Episode 31 In this episode of BHIS Presents: AI Security Ops, the panel dives into the hidden danger of data poisoning – where attackers corrupt the data that trains your AI models, leading to unpredictable and often harmful behavior. Fro…
…
continue reading
1
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09In this episode of the Security Repo Podcast, David Cross, CISO at Atlassian and former Microsoft, Google, and Oracle security leader, shares his journey from Navy electronic warfare to global cybersecurity leadership. He offers hard-won insights on breaking into the industry, the evolving demands of the CISO role, and the practical impacts of AI o…
…
continue reading
1
Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49🎙️ Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1018: Today's episode will discuss the latest news: · ClickFix Attack Uses Fake Windows Update Screen to Push Malware …
…
continue reading
1
Shai-Hulud malware leaks secrets on GitHub – 2025-11-24
1:05:01
1:05:01
Play later
Play later
Lists
Like
Liked
1:05:01Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Chapters and News Links (00:00) - PreShow Banter™ — Stressed about lithium batteries (04:59) - Shai-Hulud malware leaks secrets on GitHub – BHIS - Talkin' Bout [infosec] News 2025-11-24 (05:57) - Story # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets…
…
continue reading
1
The Death of Passwords: The Future of Authentication
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Is passwordless authentication finally ready for prime time, or are we just replacing one set of problems with another? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I'm Jim and in this episode, we're tackling one of the oldest chall…
…
continue reading
1
A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validat…
…
continue reading
1
Inside the Economics That Shape Modern Cybersecurity Innovations: How the Cybersecurity Startup Engine Really Works | A Conversation with Investor and Author, Ross Haleliuk | Redefining CyberSecurity with ...
47:10
47:10
Play later
Play later
Lists
Like
Liked
47:10⬥EPISODE NOTES⬥ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the sec…
…
continue reading
1
Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties
16:35
16:35
Play later
Play later
Lists
Like
Liked
16:35🎙️ Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1017: Today's episode will discuss the latest news: · Hackers Knock Out Systems at Russia Operated Post in Ukraine · …
…
continue reading
1
Why Architect for Human Error When We Can Make People Feel Really Bad About It?
39:23
39:23
Play later
Play later
Lists
Like
Liked
39:23All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility. In this episode Mindset over tools When hygiene becomes risk Systems for actual humans Conversations over compliance Huge than…
…
continue reading
1
Iberia Discloses Customer Data Leak After Breach, CrowdStrike Catches Insider Feeding Threat Intelligence, Oracle Identity Manager Flaw Exploited as Zero-Day, Grafana SSIM Flaw
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06🎙️ Iberia Customer Data Leak After Vendor Breach, CrowdStrike Insider Feeding, Oracle Identity Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1016: Today's episode will discuss the latest news: · Cleveland County Oklahoma Attleboro Mass Law Enforcement Hit b…
…
continue reading
1
Fear into Fluency: Building Real Cyber Literacy
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27Panic is not a security strategy. We sit down with Craig Taylor, co-founder of Cyberhoot and longtime virtual CISO, to unpack a people-first blueprint that replaces shame and fear with positive reinforcement, practical safeguards, and repeatable habits. Craig draws on his psychology background to explain why short, gamified exercises build muscle m…
…
continue reading
1
A.I. Transcription Startup Was Just A Guy Taking Notes- 2025-11-17
1:16:33
1:16:33
Play later
Play later
Lists
Like
Liked
1:16:33Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00:00 - PreShow Banter™ — The Way the Community Rumbles 00:08:21 - A.I. Transcription Startup Was Just A Guy Taking Notes - BHIS - Talkin’ Bout [infosec] News 2025-11-17 00:09:01 - Story # 1: New data shows companies are rehiring former employees as AI falls sho…
…
continue reading
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com AI News Stories | Episode 30 In this episode of BHIS Presents: AI Security Ops, we break down the top AI cybersecurity news and trends from November 2025. Our panel covers rising public awareness of AI, the security risks of local LLMs, emerging AI-driven threats…
…
continue reading
1
Russia VAK Cyberattack Causes Widespread Outages, Amazon Details Iran Cyber-Enabled Kinetic Attacks Linking Digital Spying, Bulletproof Hosting Service Harbors Ransomware as a Service
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32🎙️ Russia VAK Cyberattack Outages, Amazon Iran Cyber-Enabled Kinetic Attacks, Bulletproof Hosting 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1015: Today's episode will discuss the latest news: · China Aligned Threat Actor Espionage Network Targets Devices Globall…
…
continue reading
1
Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean Martin
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
…
continue reading
1
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Amy Devine, a systems architect who transitioned from embedded wireless systems to cybersecurity. Amy shares the eye-opening story behind her Blue Team Con talk on how misdirected emails exposed sensitive personal data and what that means for digital identity. The conversa…
…
continue reading
1
LG Energy Solution Ransomware Incident Hits Battery Maker Operations, Malware Backdoors Linked to Iran Affecting 30K Devices, Congressional Budget Office Director Testifies Hackers Expelled Swiftly
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39🎙️ Major Battery Maker Ransomware, Iran Backdoors 30K Systems, Crypto Mining Ray Attack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1014: Today's episode will discuss the latest news: · Security Community Aims to Reach Chinese Hackers via LinkedIn for Dialogue · C…
…
continue reading
1
DoorDash Says Personal Information Stolen in Data Breach, PA AG Office Data Breach Sends Notifications, Eurofiber France Warns of Breach, Microsoft Aisuru Botnet Used 500,000 IPs in Ongoing Campaigns
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12🎙️ DoorDash Personal Info Stolen | Penn AG Office Breach | Microsoft Aisuru Botnet 500K IPs | Chrome Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1013: Today's episode will discuss the latest news: · Iranian Hackers Target Defense and Government Officials …
…
continue reading
1
Are You Implying This Line Graph Isn't a Compelling Cybersecurity Narrative?
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is our sponsored guest, Nathan Hunstad, director, security, Vanta. In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Hu…
…
continue reading
1
Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign, Checkout.com Discloses Data Breach, WaPo Says Nearly 10K Employees Impacted by Hack, JLR Breach Cost $220M
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00🎙️ Anthropic Claude AI Powered 90% Chinese Espionage, Checkout.com Breach, WaPo 10K Oracle Hack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1012: Today's episode will discuss the latest news: · Jaguar Land Rover Cyberattack Cost the Company Over $220 Million · Aki…
…
continue reading
1
Louvre’s Video Security Password Was ‘Louvre’ 2025-11-10
58:57
58:57
Play later
Play later
Lists
Like
Liked
58:57Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Chapters 00:00 - PreShow Banter™ — Humans are Done 03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-10 05:11 - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human. 15:14 - Story # 2: H…
…
continue reading