Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Internet Security Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
A podcast brought to you by Kosciusko Connect. On Connected Conversations, we talk about technology, the internet, and how to navigate the digital world in which we live.
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading

4
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come. "The Linu ...
…
continue reading
Dr Yemisi Akinbobola dives into the lived experiences of successful African women in media. Her personal interview style takes you on the life journey of these leading women. You will be inspired, laugh, but most of all you will be empowered knowing that you too can make it in the media industry.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Insightful audio from the global tech advisory firm.
…
continue reading
PING is a podcast for people who want to look behind the scenes into the workings of the Internet. Each fortnight we will chat with people who have built and are improving the health of the Internet. The views expressed by the featured speakers are their own and do not necessarily reflect the views of APNIC.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer (#)
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspi…
…
continue reading

1
Her Media Diary Episode 44: "Open, Free & Secure Internet for Women" with Sandra Aceng
1:05:33
1:05:33
Play later
Play later
Lists
Like
Liked
1:05:33Sandra Aceng is a human rights defender and digital rights advocate from Uganda. She is also the Executive Director of Women of Ugandan Network (WOUGNET), an organization that engages in research, policy advocacy, and capacity-building programs to ensure gender inclusivity in Uganda’s digital landscape. In this episode, Sandra discusses her persona…
…
continue reading

1
Iran Shuts Down It's Own Internet - 2025-06-23
1:05:55
1:05:55
Play later
Play later
Lists
Like
Liked
1:05:55Register for Free, Live webcasts & summits: https://poweredbybhis.com 00:00 - PreShow Banter™ — Explaining the Muppets 03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-23 04:52 - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks 20:20 - Story # 2: Iranian bank linked to revo…
…
continue reading

1
Securing Journalism on the ‘Data-Greedy’ Internet
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02Public-interest journalism speaks truth to power, so protecting press freedom is part of protecting democracy. But what does it take to digitally secure journalists’ work in an environment where critics, hackers, oppressive regimes, and others seem to have the free press in their crosshairs? That’s what Harlo Holmes focuses on as Freedom of the Pre…
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading

1
Grassroots Cybersecurity: Protecting Communities Through Education
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01What does it take to build real cybersecurity skills in underserved communities? In this episode of The Audit, Rasheed Alowonle shares his journey from Chicago to becoming a cybersecurity educator and community advocate. This isn't your typical career advice—it's about fortifying communities through practical security hygiene and hands-on learning.…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches;
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; (#)
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this partic…
…
continue reading

1
397. Melinda Nevala - U.S. State Privacy Laws and Individual Data Rights, Part 1.
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Melinda Nevala, a digital privacy advocate and the Marketing Director at Medcurity. The conversation touched on America’s patchwork of state privacy laws, spotlighting loopholes big tech quietly lobbied for, AI’s still-unplugged data vacuum, and the dark-pattern consent po…
…
continue reading
Why does security awareness training so often fail? In this episode of Unspoken Security, host AJ Nash welcomes Living Security CEO Ashley M. Rose to discuss this common issue. They explore how compliance-driven, "check-the-box" training creates a false sense of security. This old model relies on vanity metrics and rituals instead of reducing actua…
…
continue reading

1
A Better AI Development Assistant with Mark Miller
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00How can AI tech help you write better code? Carl and Richard talk to Mark Miller about the latest AI features coming in CodeRush. Mark talks about focusing on a fast and cost-effective AI assistant driven by voice, so you don't have to switch to a different window and type. The conversation delves into the rapid evolution of software development, u…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; (#)
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20…
…
continue reading
In episode 425 of "Smashing Security", Graham reveals how "Call of Duty: WWII" has been weaponised - allowing hackers to hijack your entire PC during online matches, thanks to ancient code and Microsoft’s Game Pass. Meanwhile, Carole digs into a con targeting the recently incarcerated, with scammers impersonating bail bond agents to fleece desperat…
…
continue reading
In this episode of PING, Doug Madory from Kentik discusses his rundown of the state of play in secure BGP across 2024 and 2025. Kentik has it’s own internal measurements of BGP behaviour and flow data across the surface of the internet, which combined with the Oregon University curated routeviews archive means Doug can analyse both the publicly vis…
…
continue reading

1
North Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Pre Stream Appropriate 03:39 - N. Korean Remote Workers are at it Again! – BHIS - Talkin’ Bout [infosec] News 2025-07-07 05:41 - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats 20:01 -…
…
continue reading
"The Juniper Tree" (also "The Almond Tree"; Low German: Von dem Machandelboom) is a German fairy tale published in Low German by the Brothers Grimm in Grimm's Fairy Tales in 1812 (KHM 47).[1] The story contains themes of child abuse, murder, cannibalism and biblical symbolism and is one of the Brothers Grimm's darker and more mature fairy tales.…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

51
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

51
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack;
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
…
continue reading

1
Building Real Software using PowerApps with Luise Freese
38:35
38:35
Play later
Play later
Lists
Like
Liked
38:35How does a PowerApp become a fully-fledged software application? Richard chats with Luise Freese about her experience of taking a PowerApp built by an individual through the "onboarding process" of becoming a complete software application, including requirements, tests, deployment pipeline, security, user training, and more. It's easy to create a p…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; (#)
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was discl…
…
continue reading

1
Her Media Diary Episode 45: "Regulating AI: Who's Responsible for Gendered Harm?" with Dr Grace Githaiga
57:12
57:12
Play later
Play later
Lists
Like
Liked
57:12Dr. Grace Githaiga is the CEO at KICTANET and a visionary leader with over 20 years of expertise in ICT policy advocacy. She spearheads progressive advocacy for inclusive ICT policies on data protection, cybersecurity, gender, accessibility, and civic digital rights. In this episode, she joins us to unpack what feminist digital justice really means…
…
continue reading

1
Decoding the Planet: From Whales to Whistleblowers
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23AI may be able to talk to animals, but at what cost to the planet. Who is making those decisions, and why it matters. From decoding whale language to protecting our oceans from unchecked offshore drilling, Bridget Todd talks to visionaries seeking to preserve our beautiful, fragile world. Holly Alpine left her job with Microsoft over the company’s …
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams (#)
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams What’s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS inf…
…
continue reading

1
Episode 271: Blade Runner Pepsi Challenge
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00This week Dave and Gunnar talk about best practices for manipulating AI models to enslave humanity! Moen’s lifetime warranty Gemini multimodal! When We Cease to Understand the World by Benjamín Labatut Einstein’s Dreams by Alan Lightman Chatbots, Like the Rest of Us, Just Want to Be Loved D&G Blade Runner Home Edition: Human or Not? How nice that s…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs (#)
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be e…
…
continue reading