Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Internet Security Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
Guys is a show about different types of guys and even some specific guys. I will be investigating the weirdest, dumbest, and silliest guys on the internet!
…
continue reading
A podcast brought to you by Kosciusko Connect. On Connected Conversations, we talk about technology, the internet, and how to navigate the digital world in which we live.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
…
continue reading
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come. "The Linu ...
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increas…
…
continue reading
The A.I. boom is reshaping our world—and quietly guzzling power. This week, sustainable code advocate Stuart Clark explains how the race to build smarter machines is heating up our planet—and how we can code our way to a cleaner future. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Nigel Phair – Cyber Scams in Asia: Victim Blaming, Underreporting, and the Need for Change
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57Why are cyber scams rapidly increasing across Asia while law enforcement, education, and industry still struggle to keep pace? In this episode of THEOS Cybernova, Paul Jackson reconnects with Nigel Phair of Monash University to discuss the scam crisis in APAC. They explore why victims are blamed instead of supported, how underreporting skews the tr…
…
continue reading

1
EP59: Connectivity in the gaming industry: trends, drivers, latency & bandwidth
16:33
16:33
Play later
Play later
Lists
Like
Liked
16:33In this episode, Markus Viitamäki, Senior Infrastructure Architect at Embark Studios joins the podcast to discuss trends in the gaming industry, main drivers to creating a new game, and how much latency and bandwidth are affecting the gaming experience.By MATTIAS FRIDSTRÖM
…
continue reading

1
405. Melinda Nevala - U.S. State Privacy Laws and Individual Data Rights, Part 2.
1:27:21
1:27:21
Play later
Play later
Lists
Like
Liked
1:27:21Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Melinda Nevala, a digital privacy advocate and the Marketing Director at Medcurity. The conversation touched on America’s patchwork of state privacy laws, spotlighting loopholes big tech quietly lobbied for, AI’s still-unplugged data vacuum, and the dark-pattern consent po…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
…
continue reading

1
Design at GitHub with Diana Mounter
1:06:50
1:06:50
Play later
Play later
Lists
Like
Liked
1:06:50How did the design of GitHub evolve? Carl and Richard speak with Diana Mounter about her experiences at GitHub, including her role as head of design. Diana discusses how she was drawn to GitHub as a designer and how her career evolved to lead design for the company. The conversation ranges over different design concepts, the Primer design language,…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report (#)
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallet…
…
continue reading

1
Oops! I auto-filled my password into a cookie banner
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51We unpack how some password managers can be tricked into coughing up your secrets, with a clickjacking sleight-of-hand, what website owners can do to prevent it, and how to lock down your personal password vault. Then we time-hope to the post-quantum scramble: "harvest-now, decrypt later", Microsoft's 2033 quantum-safe pledge, and whether your prin…
…
continue reading
This week Dave and Gunnar talk about smart glasses and AI existential dread! Follow Up Duperheroes! I Previewed These Emotion-Tracking Smart Glasses, and They Seem Weirdly Useful Someone Built an Ad Blocker for Real Life, and I Can't Wait to Try It 'Positive review only': Researchers hide AI prompts in papers Someone trapped an LLM on inferior hard…
…
continue reading
The human brain might be the grandest computer of all, but in this episode, we talk to two experts who confirm that the ability for tech to decipher thoughts, and perhaps even manipulate them, isn't just around the corner – it's already here. Rapidly advancing "neurotechnology" could offer new ways for people with brain trauma or degenerative disea…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
…
continue reading
What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited; (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited; Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20B…
…
continue reading

1
****Repost*** Guys: Episode 134 - Feet Guys (PG) with Branson
1:33:55
1:33:55
Play later
Play later
Lists
Like
Liked
1:33:55This week on Guys we had Branson from The E1 Podcast to talk about a different type of foot guy. What sort of loopholes can you usew to go to a concert barefoot? How do you get your feet clean? How do you become a foot lawyer? Is it important to be grounded? There is more Chris at https://www.patreon.com/notevenashow And for more Guys content, stre…
…
continue reading
For years, companies have been collecting our data—tracking what we search, where we go, what we buy. But now, empowered by AI and fewer government protections, that data is being used to do something unsettling: personalized prices. We look at how it works. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln (#)
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%…
…
continue reading

1
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this con…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions (#)
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were “zero padded”, an unfortunate choice. As of this week, datafeeds should no longer be “zero …
…
continue reading
Remember all that "AI is gonna change everything" nonsense the kids were screaming about just a few months ago? Yeah, about that. It turns out 95% of corporate generative AI pilots are, to use a technical term, completely shitting the bed, according to a report from MIT. This shocking revelation has sent Wall Street into a tizzy, wiping trillions o…
…
continue reading
What happens when a government erases a people’s digital past? This week on Click Here’s Mic Drop, the story of China’s quiet purge of the Uyghur web—and the lone coder determined to bring it back to life. ERASED is a four-part investigation into how China is wiping Uyghur culture from existence — one law, one app, one person, one website at a time…
…
continue reading