Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Internet Security Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
  continue reading
 
Artwork

51
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork
 
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Artwork
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
Citation Needed

Citation Needed Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
  continue reading
 
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
  continue reading
 
Artwork

1
This Week in NET

Cloudflare

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Artwork

51
Bcc

Internet Society Foundation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Internet Society Foundation's Program Director, Shayna Robinson, in exploring the many facets of the Internet and its power as a force for good in the world. Listen as she and her guest hosts copy you in on interviews with experts, thoughtful stories from around the globe, and trending topics about everyday digital life.
  continue reading
 
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
Artwork
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
  continue reading
 
Loading …
show series
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing V…
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00:00 - PreShow Banter™ — AWS Snow Day Party 00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-20 00:12:12 - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code 00:35:11 - Story # 2: News…
  continue reading
 
If you’ve ever shipped an AI feature that looked great in testing — only to watch it behave unpredictably in production — you’re not alone. In this episode of IT Visionaries, host Chris Brandt talks with Lawrence Jones, Founding Engineer at incident.io, about the critical gap between AI that demos well and AI that works under pressure. Lawrence sha…
  continue reading
 
Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away. Plus when ransomware negotiators turn to the dark side, what could possibly go wrong? All this and more is discussed in episode 442 of the "Smashing Security" podcast with cybersecurity …
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
The future of updating Windows is here! Richard talks to Aria Hanson about Windows Autopatch, the consolidation of Microsoft's various update mechanisms to keep your managed Windows devices current. Aria discusses the deprecation of Windows Server Update Services (WSUS) and the move to always-on cloud updates. The conversation turns to the various …
  continue reading
 
TL;DR: This week's pod features your favorite hosts reflecting on how security has lost its way. When everything is a catastrophe, nothing is. When every breach is world-ending, none of them matter. Have we completely lost the plot? Prepare to have a good think. YouTube Video: Have something to say? Let's hear it. Support the show >>>…
  continue reading
 
Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode, she shares wild stories from the front lines of cybersecurity. She shares stories of when she was a penetration tester to an incident responder. You can sign up for her newsletter at https://newsletter.shehackspurple.ca/ Sponsor…
  continue reading
 
In 2017, NSA contractor Reality Winner mailed a five-page classified document to “The Intercept.” What happened next – a botched verification, an FBI knock at her door, and a prison sentence under the Espionage Act – raised big questions about how journalists handle secrets and how the government punishes those who share them. We talk to Reality ab…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.ed…
  continue reading
 
In this second part of our previous episode, host João Tomé talks with André Jesus, Systems Engineer at Cloudflare and front-end engineer on the Radar team. They discuss the latest updates to Cloudflare Radar, the platform that turns Internet data into accessible insights. André, who joined Cloudflare as an intern in Lisbon, Portugal, in 2024, expl…
  continue reading
 
Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! iClou…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
  continue reading
 
Hh hey maybe don't buy that $14 projector off amazon. In this episode, we dive into the sequel nobody asked for: BADBOX 2.0 — the return of last year’s botnet built out of bargain-bin Android gadgets. Google just filed a lawsuit in federal court alleging that millions of sketchy streaming boxes, projectors, and mystery electronics were shipped pre-…
  continue reading
 
For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyteller at Show & Tell, into the Tech Transforms cauldron. Each brings a “secret AI ingredient”: Carolyn composes whimsical Suno-generated theme music (after a prompt-crafting de…
  continue reading
 
This week’s episode started with the usual existential sigh before tumbling straight into the corporate bloodbath. Amazon chopped 14,000 jobs under the noble banner of “embracing AI,” which CEO Andy Jassy insists isn’t about money—despite swimming Scrooge McDuck–style in profit. GM’s cutting 1,700 workers, YouTube’s dangling “voluntary” buyouts, an…
  continue reading
 
In this episode, host João Tomé talks with Marwan Fayed, Principal Scientist and Research Lead at Cloudflare, about the science behind understanding and improving the Internet. They explore the Research Week blog takeover on Measurement, Resilience, and Transparency, discussing the tricky science of Internet measurement — including a traffic spike …
  continue reading
 
Three Buddy Problem - Episode 70: Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets…
  continue reading
 
On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »…
  continue reading
 
Every product a company ships depends on thousands of tiny decisions happening deep inside the supply chain. But most organizations are still making those decisions using stale spreadsheets, fragmented systems, and guesswork. In this episode, we explore how AI-driven procurement intelligence is changing the game – moving teams from reactive firefig…
  continue reading
 
Big Tech’s data centers are changing the landscape of small-town America, bringing new kinds of jobs and economic opportunity. This week, we hear from Shannon Wait, a data technician in South Carolina whose experience led to a rare labor settlement — offering a window into what life inside these facilities is really like. Learn about your ad choice…
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com The BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy shake-ups. Join our panel of security pros for expert analysis, sharp humor, and practical insights…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
  continue reading
 
What happens when strategy consulting meets the trenches of enterprise AI deployment? Dr. Jasper Schwenzow, AI Lead for Defense at deepset, reveals why 70-80% of AI work is unglamorous data cleaning, not magic. From McKinsey to PhD to defense applications, discover why "speaking about the details" separates functional AI systems from expensive demo…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play