Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Internet Security Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Talkin' Bout [Infosec] News

Black Hills Information Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET https://www.youtube.com/@BlackHillsInformationSecurity Brought to you by Black Hills Information Security. https://www.blackhillsinfosec.com
  continue reading
 
Artwork

1
Tech Policy From The Hill

Congressional Internet Caucus Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Congressional Internet Caucus Academy works to educate policymakers on critical Internet policy issues. With funding and logistical support from the Internet Education Foundation, the Internet Caucus Advisory Committee hosts regular debates to discuss important Internet policy issues. Since its founding, the Internet Caucus Advisory Committee has built a membership of over 200 organizations from a broad cross-section of the public interest community and the Internet industry. The Interne ...
  continue reading
 
Artwork
 
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Digital Politics with Karen Jagoda is a non-partisan podcast featuring thought leaders and industry pioneers with insights about innovative approaches to political campaigns, voter engagement, mobilization, fundraising, persuasion, and GOTV. Topics include the power of mobile devices, leveraging social networks, message testing and targeting, cross-media advertising, grassroots organizing, and big data.
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
This Week in NET

Cloudflare

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
  continue reading
 
Artwork
 
When you're focused on work, you don't expect your next hour on the clock to be the most horrifying in your life. In Tales from the Breakroom, folks from around the world send us their scariest workplace encounters and we narrate them to you. Enjoy, and try not to clock out forever... Submit your scariest work experiences at https://www.eeriecast.com/submit
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Artwork

1
Citation Needed

Citation Needed Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
  continue reading
 
Artwork

1
TechDaily.ai

TechDaily.ai

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech world—one episode at a time. Stay informed, stay inspired!
  continue reading
 
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork

1
Fruitfulujah

Sefa Tsegha

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Fruitfulujah Podcast, your go-to weekly show delving into the realms of the internet, business, and, most importantly, you. Join us as we demystify technology for the everyday individual, empowering you to cultivate successful internet ventures. Tune in for insightful discussions that bridge the gap between the digital world and your personal and professional growth.
  continue reading
 
Artwork

1
Cyber Focus

McCrary Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Loading …
show series
 
Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
  continue reading
 
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
  continue reading
 
Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent "accidental" disruptions and growing geopolitical risk. Listeners hear why chokepoints, island depende…
  continue reading
 
This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
  continue reading
 
Join Sean in this hour as he dives into pressing news topics, from low gas prices and a shrinking trade deficit to ongoing conversations about healthcare reform. He presents bold solutions to address issues impacting hardworking Americans while highlighting how leftist policies are failing residents in places like California. With a mix of humor an…
  continue reading
 
In this hour of the Sean Hannity Show, Sean dives into the ongoing clash over parental rights in the classroom, focusing on a recent federal lawsuit against New York Attorney General Letitia James. Guests include parents and school board members from the Massapequa School District who are standing up against threats to free speech and advocacy for …
  continue reading
 
In this hour of The Sean Hannity Show, Sean dives deep into the ongoing challenges posed by the Affordable Care Act, discussing its broken promises and the reality of rising healthcare costs. He highlights testimonies from experts who shed light on the fraud within federal contracting programs and the ineffectiveness of government-run healthcare sy…
  continue reading
 
Just when I thought it couldn't get worse, it did. Two sitting members of Congress bashed the memories of two National Guard members attacked on 11.26.25. One is still in the hospital, and one lost her life. So many of the representatives who sat in that hearing today said offensive things, but these two take the cake. You have to hear it for yours…
  continue reading
 
Quantum computing is moving from theory to reality, and with it comes a fundamental shift in how organizations must protect long-lived and sensitive data. In this episode, Cathy Chan from Cyberforce explains what Q-Day really means, why “harvest now, decrypt later” is already a live threat, and how enterprises can build crypto-agility before post-q…
  continue reading
 
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! https:/…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git…
  continue reading
 
John Fitch, The Fitch Law Firm, joins Deepak Puri, CEO of The Democracy Labs, to discuss the importance of victims reporting sexual abuse not only for their own justice but to break the cycle and prevent perpetrators from harming others. John warns that delayed reporting can lead to the loss of essential physical evidence, making the case harder to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into cloud security fundamentals, perfect for those preparing for the CompTIA Security+ exam. Join our study group as we explore the shifting security landscape from locked server rooms to identity-based perimeters and data distributed across regions. This …
  continue reading
 
A huge legislative effort has been underway, led by Rep. Tim Burchett of Tennessee. Finally, someone with a backbone, standing up to the RINOS and traitors in the House and Senate, sending American tax dollars to terrorist nations, and funding the Taliban. And to top it off, it's about $45 million a week, which is out of control on every level. Tod…
  continue reading
 
Join Sean in this hour as he delivers a hard-hitting news roundup, digging into the alarming corruption uncovered in Minnesota's Somali welfare fraud scandal. With insights from House Oversight Committee Chairman James Comer and former Speaker of the House Newt Gingrich, Sean sheds light on how this situation may extend far beyond what has been rep…
  continue reading
 
Join Sean in this festive episode as he playfully debates the merits of classic Christmas music, giving a nod to Grandma's favorite tunes versus his own preferences. The conversation takes a humorous turn as they discuss holiday traditions, from eggnog to the quirks of family gatherings. Listen in as Sean reveals his own experiences with holiday be…
  continue reading
 
In this episode, Sean welcomes Bill O'Reilly to discuss the troubling rise of conspiracy theories and the personal attacks targeted at the family of the recently assassinated Charlie Kirk. Reflecting on comments made by Democrat John Fetterman, they emphasize the importance of letting the Kirk family grieve without the intrusion of vile rumors and …
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
  continue reading
 
Valve is back in the living room—with a bold second try. In this episode, we dive into the leaked specs of Valve’s upcoming gaming PC, unofficially dubbed the "Gabe Cube," slated for release in early 2026. Designed as a compact, Linux-based console alternative, the Gabe Cube aims to succeed where the 2015 Steam Machine failed—but is it enough? We u…
  continue reading
 
In a move no one saw coming, AWS and Google Cloud have joined forces to tackle one of the biggest headaches in enterprise infrastructure: multicloud networking. On this episode, David and Sophia unpack the implications of this unprecedented partnership and what it means for cloud engineers, CTOs, and FinOps teams alike. Here’s what you’ll learn: • …
  continue reading
 
SoftBank is no longer just playing in tech—it’s going all in on artificial super intelligence. In this episode, we break down how a staggering $13 billion return from its OpenAI stake catalyzed one of the boldest strategic pivots in the company’s history. From cashing out legacy assets to executing rapid-fire acquisitions, here’s how SoftBank is ra…
  continue reading
 
In this episode of This Week in NET, host João Tomé sits down with Stephanie Cohen, Cloudflare’s Chief Strategy Officer, for a candid conversation about AI, content creators, financial services, partnerships, and the future of the Internet. Stephanie shares how Cloudflare is helping keep the Internet open and resilient — from giving creators transp…
  continue reading
 
Social media algorithms are doing more than curating your feed—they're shaping global discourse, politics, and even national security. In this thought-provoking episode, we unpack the complex duality of these systems: tools for managing overwhelming content, yet engines of division and misinformation. Key takeaways include: • Why engagement-based r…
  continue reading
 
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
  continue reading
 
Behdad Jamshidi is the Founder of CJAM The Marketing Connector, which has vetted over 1,000 marketing agencies to identify those most qualified to deliver on their promises. The idea of a single agency handling all political and advocacy campaign needs is no longer realistic, as there are an increasing number of channels to reach voters and support…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
In this episode of Sean's podcast, he dives deep into the contentious issues surrounding open borders and the current state of policing in America. With a focus on the alarming rise in drug-related deaths linked to cartels, Sean discusses President Trump's efforts to combat these threats and the legal aspects of targeting drug traffickers labeled a…
  continue reading
 
Join Sean this hour as he tackles the challenges facing American farmers and the impact of recent economic policies. He welcomes Secretary of Agriculture Brooke Rollins, who highlights the devastating increases in agricultural input costs under the Biden administration, and discusses the urgent need for fair trade practices to support farmers. Hear…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
  continue reading
 
On July 19, 2024, a misconfigured file sent as part of an update to the Falcon Sensor suite by CrowdStrike caused service outages worldwide. Liam Westley talks about his experiences executing the incident management plan at his company that day—even though his company did not use the software! Liam talks about dealing with the regulatory requiremen…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play