Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Internet Security Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
  continue reading
 
Artwork

754
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork
 
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Artwork
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
Artwork

104
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
Artwork

1
Citation Needed

Citation Needed Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
  continue reading
 
Artwork

1
This Week in NET

Cloudflare

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
  continue reading
 
Artwork

3051
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
  continue reading
 
Artwork
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Artwork

1
Bcc

Internet Society Foundation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Internet Society Foundation's Program Director, Shayna Robinson, in exploring the many facets of the Internet and its power as a force for good in the world. Listen as she and her guest hosts copy you in on interviews with experts, thoughtful stories from around the globe, and trending topics about everyday digital life.
  continue reading
 
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
  continue reading
 
Loading …
show series
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/d…
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00:00 - PreShow Banter™ — AWS Snow Day Party 00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-20 00:12:12 - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code 00:35:11 - Story # 2: News…
  continue reading
 
Cloudflare Principal Network Engineer Tom Strickx joins This Week in NET to explain what really keeps the Internet running. From anchors cutting submarine cables to automation detecting bad Internet weather, Tom shares an inside look at how one of the world’s largest networks operates — and why human trust still matters in keeping the Internet aliv…
  continue reading
 
This episode proves that nothing gold can stay, especially your 401k, as we kick things off with the revelation that October saw the worst tech layoffs since 2003, all while "Big Short" genius Michael Burry decided to bet a billion dollars on the inevitable AI bubble bursting. The villains of the week are legion: the FCC is officially making it eas…
  continue reading
 
What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
  continue reading
 
The Espionage Act was written more than a century ago to stop spies and saboteurs. But over time, its reach has quietly expanded — from enemy agents to insiders, and now, possibly, to the press itself. Georgetown Law’s Stephen Vladeck explains how a law built for wartime secrecy could become one of the most powerful tools in Washington’s arsenal. L…
  continue reading
 
Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privacy Bad Ass David - Privacy Bad Ass Daniel J Martin - Privacy Bad Ass TK - Privacy Bad Ass David - Privacy Bad Ass MrMilkMustache - P…
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Musical Views of the Universe 04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-03 04:39 - Story # 1: Ransomware profits drop as victims stop paying hackers 06:22 - Chart since 2019 16:06 - Story # 2: More than a million people every we…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away. Plus when ransomware negotiators turn to the dark side, what could possibly go wrong? All this and more is discussed in episode 442 of the "Smashing Security" podcast with cybersecurity …
  continue reading
 
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing V…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
The future of updating Windows is here! Richard talks to Aria Hanson about Windows Autopatch, the consolidation of Microsoft's various update mechanisms to keep your managed Windows devices current. Aria discusses the deprecation of Windows Server Update Services (WSUS) and the move to always-on cloud updates. The conversation turns to the various …
  continue reading
 
Seduction, love bombing and stolen trade secrets. Former Russian sex spy Aliia Roza reveals the dark playbook foreign operatives use to turn Silicon Valley tech executives into assets. Now she warns your new romance could be a state-sponsored plot to steal everything. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
TL;DR: This week's pod features your favorite hosts reflecting on how security has lost its way. When everything is a catastrophe, nothing is. When every breach is world-ending, none of them matter. Have we completely lost the plot? Prepare to have a good think. YouTube Video: Have something to say? Let's hear it. Support the show >>>…
  continue reading
 
Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode, she shares wild stories from the front lines of cybersecurity. She shares stories of when she was a penetration tester to an incident responder. You can sign up for her newsletter at https://newsletter.shehackspurple.ca/ Sponsor…
  continue reading
 
In 2017, NSA contractor Reality Winner mailed a five-page classified document to “The Intercept.” What happened next – a botched verification, an FBI knock at her door, and a prison sentence under the Espionage Act – raised big questions about how journalists handle secrets and how the government punishes those who share them. We talk to Reality ab…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.ed…
  continue reading
 
In this second part of our previous episode, host João Tomé talks with André Jesus, Systems Engineer at Cloudflare and front-end engineer on the Radar team. They discuss the latest updates to Cloudflare Radar, the platform that turns Internet data into accessible insights. André, who joined Cloudflare as an intern in Lisbon, Portugal, in 2024, expl…
  continue reading
 
Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! iClou…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
  continue reading
 
Hh hey maybe don't buy that $14 projector off amazon. In this episode, we dive into the sequel nobody asked for: BADBOX 2.0 — the return of last year’s botnet built out of bargain-bin Android gadgets. Google just filed a lawsuit in federal court alleging that millions of sketchy streaming boxes, projectors, and mystery electronics were shipped pre-…
  continue reading
 
For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyteller at Show & Tell, into the Tech Transforms cauldron. Each brings a “secret AI ingredient”: Carolyn composes whimsical Suno-generated theme music (after a prompt-crafting de…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play