A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Network Firewall Podcasts
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
SecurityGen
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
With nearly 30+ years of combined network marketing experience, this dynamic father/son duo has literally rewritten the blueprint & cracked the code of building teams in depth. Combining the power & speed of the digital revolution with proven "old school" fundamentals and principals that have stood the test of time, Chris & Dale McNelly will not only show you how to build your business at lightning speed, but also how to keep that team together for true passive income, & a legacy organization.
…
continue reading
Current content form the PC World Magazine
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
…
continue reading
Google expands Chrome Autofill with 4 smart new features.
…
continue reading
Big Android XR update brings PC app streaming to headsets, plus more.
…
continue reading
Level up your gaming with peripherals that make a real difference.
…
continue reading
Discord admits Windows 11 app hogs RAM, tries solving it with auto-restarts.
…
continue reading
Turn one laptop USB-C into 17 ports: Baseus dock is now 25% off on Amazon.
…
continue reading
I just told Alexa+ to buy the first cheap Sonos speaker it sees.
…
continue reading
Nows your chance!
…
continue reading
Get Samsungs 32-inch 4K monitor for just $200 (41% off) while you can.
…
continue reading
Most homeowners want a smart home.
…
continue reading
Addlink P50 review: A versatile USB flash drive hiding SSD might.
…
continue reading
Ugreens fast 4-port USB-C charger drops to all-time low price: $34.
…
continue reading
The 5 essential features I look for when buying computer speakers.
…
continue reading
Dropped it?
…
continue reading
Finally, scans from your phone that dont look like pictures.
…
continue reading
Im sick of $70 games.
…
continue reading
In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim i…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory (#)
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as "undocumented" may actually be documented in the underlying hardware description. https://www.to…
…
continue reading
Best mini PC deals: Top picks for performance, gaming, and more.
…
continue reading
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
…
continue reading
OpenAI turns off ads on ChatGPT as AI falls short.
…
continue reading
Androids new anti-scam feature helps spot legit calls before picking up.
…
continue reading
Dell, Lenovo said to be raising prices as chip shortages worsen.
…
continue reading
I was afraid to install a smart lock.
…
continue reading
Microsoft Teams can soon snitch on your location using Wi-Fi connections.
…
continue reading
Philips Hue White & Color smart bulb 3-pack drops to $80 (27% off).
…
continue reading
Dont want AI Actions in File Explorer?
…
continue reading
16 new features coming in Windows 11s huge December update.
…
continue reading
Blinks Mini 2 home Wi-Fi security cam is just $18 today (was $40).
…
continue reading
Best portable monitors 2025: Displays that go with you.
…
continue reading
Windows 11s newly revamped Start menu design is annoyingly large.
…
continue reading
Iniu pocket-size USB-C power bank deal: Get it for 32% off right now.
…
continue reading
Never, ever put these 6 devices near your Wi-Fi router.
…
continue reading
Beelinks home office mini PC drops to $339: Ryzen 7 and 24GB RAM.
…
continue reading
AI video descriptions are coming to Blink security cameras.
…
continue reading
Your VPN isnt showing up in your network connections.
…
continue reading
How to allow apps through Windows 11s firewall.
…
continue reading
Asus ExpertBook P3 review: A better Copilot+ PC for work.
…
continue reading
I switched to a minimalist PC gaming setup, and it rules.
…
continue reading
Your new work essentials: Acrobat Pro + Office Pro for just $85.
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln (#)
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the "FileInstall" function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20…
…
continue reading
Its used to cost $199 to upgrade to Windows 11 Pro, but right now, its only $10.
…
continue reading
A new Dropbox alternative just dropped the price for a 1TB lifetime subscription.
…
continue reading
1
Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
…
continue reading
New AI tool is like a private, no-subscription ChatGPT on your desktop.
…
continue reading
1
When macOS gets frostbite. [Research Saturday]
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
…
continue reading
1
China’s quiet crawl into critical networks.
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
…
continue reading
Best gaming monitors 2025: 9 displays that will do your games justice.
…
continue reading