Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Internet Security Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
Pragmatic CSO Podcast

Mike Rothman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
  continue reading
 
Artwork
 
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
  continue reading
 
Artwork
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
Artwork

1
Tech Policy From The Hill

Congressional Internet Caucus Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Congressional Internet Caucus Academy works to educate policymakers on critical Internet policy issues. With funding and logistical support from the Internet Education Foundation, the Internet Caucus Advisory Committee hosts regular debates to discuss important Internet policy issues. Since its founding, the Internet Caucus Advisory Committee has built a membership of over 200 organizations from a broad cross-section of the public interest community and the Internet industry. The Interne ...
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
Artwork
 
When you're focused on work, you don't expect your next hour on the clock to be the most horrifying in your life. In Tales from the Breakroom, folks from around the world send us their scariest workplace encounters and we narrate them to you. Enjoy, and try not to clock out forever... Submit your scariest work experiences at https://www.eeriecast.com/submit
  continue reading
 
Artwork

1
Cyber Leaders

SANS Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Data and Confused

Glen Kendell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Glen Kendell sits down with industry experts to explore the often-murky waters of data in various sectors. Each episode breaks down how complex, overwhelming, or just plain confusing data can be—and, more importantly, how to make sense of it. Data and Confused offers insightful conversations, real-world examples, and practical takeaways to help bring clarity to the chaos. For business inquiries email [email protected]
  continue reading
 
The Tyler Woodward Project is a weekly show about the way technology, science, and culture actually collide in real life, told through the lens of an elder millennial who grew up alongside the internet and watched it get corporate. Each episode breaks down the systems, tools, and ideas shaping how we work, communicate, and live, without the buzzwords, posturing, or fake hype. Expect smart, grounded conversations, a bit of sarcasm, and clear explanations that make complex topics feel human an ...
  continue reading
 
Artwork

1
Citation Needed

Citation Needed Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
  continue reading
 
Artwork

4
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
Artwork
 
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
  continue reading
 
Artwork

4
Mint Techcetra

Mint - HT Smartcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Mint Techcetra podcast is your navigator into the mesmerizing maze that is technology today. From decoding technologies, policies, enterprises, and legal decisions to sci-fi and pop culture, this podcast will cover it all. Every week hosts - Leslie D'Monte, Shouvik Das and Deepti Ahuja - will talk about important developments in tech and how they transform our lives, work and play as we know it. If you have any questions or suggestions you can reach out to the hosts on LinkedIn via their ...
  continue reading
 
Artwork
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
  continue reading
 
Artwork

1
Cyber Focus

McCrary Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Artwork

1
Bcc

Internet Society Foundation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Internet Society Foundation's Program Director, Shayna Robinson, in exploring the many facets of the Internet and its power as a force for good in the world. Listen as she and her guest hosts copy you in on interviews with experts, thoughtful stories from around the globe, and trending topics about everyday digital life.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Loading …
show series
 
Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow https://appomni.…
  continue reading
 
SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 B…
  continue reading
 
Bevan Slattery, Australian entrepreneur and founder of multiple telecommunications ventures, spoke at The Tech Capital the 3rd annual APAC Finance Forum in Singapore on the evolving digital infrastructure landscape in Australia and Asia. Slattery noted the extensive rebuilding of internet connectivity over the past 12 to 24 months. “When you look a…
  continue reading
 
Hundreds of proposed amendments to the United States Constitution are introduced during each session of the United States Congress. From 1789 through January 3, 2025, approximately 11,985 measures have been proposed to amend the United States Constitution.[1] Collectively, members of the House and Senate typically propose around 200 amendments duri…
  continue reading
 
In this episode of Mint Techcetra, host Nelson John sits down with Madhu Kurup, Vice President of Engineering at Indeed, to explore how artificial intelligence is transforming India’s hiring ecosystem. Madhu unpacks the growing role of AI in improving job matching, supporting recruiters, and empowering job seekers through greater efficiency and pro…
  continue reading
 
The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
  continue reading
 
Microsoft Patch Tuesday January 2026 Microsoft released patches for 113 vulnerabilities. This includes one already exploited vulnerability, one that was made public before today and eight critical vulnerabilities. https://isc.sans.edu/diary/January%202026%20Microsoft%20Patch%20Tuesday%20Summary/32624 Adobe Patches Adobe released patches for five pr…
  continue reading
 
SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix Microsoft Patch Tuesday January 2026 Microsoft released patches for 113 vulnerabilities. This includes one already exploited vulnerability, one that was made public before today and eight critical vulnerabilities. https://isc.sans.edu/diary/January%20202…
  continue reading
 
What's coming in 2026 for Azure? Richard chats with CVP and Chief Product Officer for Azure, Jeremy Winter, about the announcements at Ignite and what we can expect in Azure over the next year. Jeremy talks about new features for migrating workloads to Azure, creating more reliable application implementations, the vast array of AI-related technolog…
  continue reading
 
Chris Inglis joins Frank Cilluffo to break down what offensive cyber strategy should look like in an era of strategic competition. Drawing from the McCrary Institute's new report on U.S. cyber policy, Inglis argues that resilience and consequences are not competing theories—they have to work together. He explains why "defend forward" and persistent…
  continue reading
 
A state trooper confesses his most disturbing encounter in the wooded mountains of North America. This and 4 other true horror stories in today's episode. Get you our Tales from the Break Room coffee: https://eeriecast.store/products/mourning-brew-coffee-tales-from-the-break-room Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
“This is not really a question of morality; it’s about respecting the laws of the land.” In this episode, hosts Leslie D'Monte and Shouvik Das break down why Elon Musk’s Grok found itself in trouble across nations like India, Malaysia, and the European Union. We examine the controversy surrounding its "Spicy Mode" within India’s legal framework, de…
  continue reading
 
Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
  continue reading
 
n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-rese…
  continue reading
 
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time…
  continue reading
 
In this episode of Data and Confused, Glen is joined by Chris Brown of WoW Remote Teams to explore what actually makes remote and nearshore hiring succeed or fail. Chris shares hard-earned lessons from scaling teams across Latin America, including why communication and expectations matter more than cost savings, how to avoid hiring “unicorns,” and …
  continue reading
 
This week Dave and Gunnar talk about diverse AI opinions and the wisdom of crowds! Trinity and Low-background Steel Hardcore History Slate Political Gabfest Google Vids! Researchers find adding this one simple sentence to prompts makes AI models way more creative D&G This Week in Bad Ideas Kalshi Becomes CNN’s Official Prediction Market Partner Aft…
  continue reading
 
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
  continue reading
 
The conversation provides a practical overview of how the internet works, covering the basics of IP, DNS, TCP, UDP, and HTTPS, the play-by-play of typing a URL, content delivery, network routing, internet problems, real-life scenarios, physical reality, cultural impact, and practical takeaways for internet issues. Views expressed are solely those o…
  continue reading
 
In this episode of You Gotta Hack That, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a family of standards), w…
  continue reading
 
Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1.11.0 Release: Hash Function Warnings The latest version of YARA will warn users if a hash rule attempts to ma…
  continue reading
 
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1…
  continue reading
 
The episode discusses the Instagram data leak affecting 17.5 million accounts and the potential risks of scams. It also provides tips on protecting against such scams and emphasizes the importance of multi-factor authentication. All views and opinions expressed in this show are solely those of the creator and do not represent or reflect the views, …
  continue reading
 
Welcome back to the digital wasteland, fellow survivors. We kick things off in the FOLLOW UP by marking a year since the LA Fires—hello, PTSD—alongside a 4th Strokiversary and three years of sobriety, all while wondering why America is currently obsessed with shooting its own civilians in the face. In the IN THE NEWS segment, Wired is finally teach…
  continue reading
 
In this end-of-year episode of This Week in NET, host João Tomé is joined by Omer Yoachimik, Senior Product Manager for DDoS Protection at Cloudflare, to break down the realities of the 2025 DDoS threat landscape — and what’s coming next. They discuss how DDoS attacks reached previously “theoretical” scales in 2025, including record-breaking 31 Tbp…
  continue reading
 
Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
  continue reading
 
What really happens when a cyberattack becomes a criminal investigation? In this episode of THEOS Cybernova, Paul Jackson speaks with Steve Santorelli, a formerly of Scotland Yard, whose career spans Microsoft’s Internet Crimes Investigation Team and Team Cymru. They explore how cybercrime investigations succeed in the real world: why trust and com…
  continue reading
 
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Se…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
Most organizations are sitting on mountains of documents, PDFs, emails, and images they still cannot fully search, organize, or understand. In this episode of IT Visionaries, host Chris Brandt sits down with Tim McIntire, CTO of Hyland, to unpack why unstructured data is still one of the biggest blockers between AI hype and real results. Tim breaks…
  continue reading
 
A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play