Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Proof Point

Stacie Porter Bilger

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This is Proof Point podcast where we decode digital success, one click at a time. We share key takeaways fueled by data and insights that your team can implement today to drive growth.
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.
  continue reading
 
Artwork

1
State of Cybercrime

Varonis, Matt Radolec, David Gibson

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
  continue reading
 
Artwork

1
OUTBOUND

Proofpoint Marketing

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Outbound is a weekly podcast illuminating the stories of sales professionals that have taken the path less traveled to build strong relationships that have led to soaring new heights and beautiful vistas. These are the stories of building relationships in sales that have led to great business outcomes.
  continue reading
 
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
  continue reading
 
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
  continue reading
 
Artwork

1
The Master Marketer Show

Proofpoint Marketing

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Master B2B marketing by learning the MINDSETS, SKILLSETS and TOOLSETS that drive revenue-generating RESULTS. Each week, we discuss revenue-generating success stories with Masters of B2B Marketing and share insightful strategy, tangible tactics and actionable advice, utilizing the MSTR Framework to help you accelerate growth. Our goal is to be the podcast top B2B marketers listen to regularly for actionable insights. We want our audience to learn from the Master Marketers that have developed ...
  continue reading
 
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
  continue reading
 
Artwork

1
Demand Wars

Bolaji Oyejide

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We love great marketing. Marketing meets your people in their problem, and guides them to a successful version of themselves. But B2B marketing is broken Fire Drill Forecasting, MQL Chasing Cyber Stalking Future Buyers Martech vendors and VCs have us focused on growth at ANY cost But only 5% of buyers are in a buying cycle. And it's a blood bath of competition. There's a war coming. And you're about to meet the Rebel Alliance. Welcome to Demand Wars. Where the best B2B marketers in the world ...
  continue reading
 
Loading …
show series
 
Charter Communications has announced its acquisition of Cox Communications for $34.5 billion, a significant move that will merge two of the largest internet service providers in the United States. This merger is expected to require approval from the Federal Communications Commission due to Cox's critical operational licenses. The combined entity pl…
  continue reading
 
In a major move within the cybersecurity space, Proofpoint has announced the acquisition of Hornetsecurity for over $1 billion. This deal significantly strengthens Proofpoint’s foothold in Microsoft 365 security, while expanding its reach into the small and mid-sized business (SMB) market through Hornetsecurity’s extensive network of managed servic…
  continue reading
 
(0:10): Square Enix Cancels Missing-Link, Focuses on Kingdom Hearts IV with New Gameplay and Disney Collaborations (2:17): M&S Cyber Attack Sparks Urgent Retail Security Overhaul Amid Rising Threats from Scattered Spider (4:32): Proofpoint Acquires Hornetsecurity for $1B to Boost MSP Capabilities Amid Cybersecurity Boom (6:42): YouTube Unveils AI-P…
  continue reading
 
In this episode, we break down the recently discovered and actively exploited Chrome vulnerability CVE-2025-4664—a high-severity flaw stemming from insufficient policy enforcement in Chrome’s Loader component. This vulnerability allows attackers to leak cross-origin data, including sensitive query parameters and session information, via crafted HTM…
  continue reading
 
In this episode, we dive deep into a newly disclosed healthcare data breach affecting over 483,000 patients of Catholic Health, stemming from a misconfigured Elasticsearch database maintained by third-party vendor Serviceaide. From September 19 to November 5, 2024, the database was inadvertently exposed to the public internet, putting highly sensit…
  continue reading
 
(0:10): Google's 'Android Desktop Mode' to Transform Smartphones into PC-like Workstations by 2025 (2:21): TSMC's 10% Wafer Price Hike to Impact Apple and Samsung, Triggering Higher Costs for Future Devices (4:10): India's Ambitious Leap to 6G: Terahertz Tech Promises 100x Faster Speeds (5:39): TSMC Expands with 8 New Fabs; Samsung Tests 2nm Proces…
  continue reading
 
Gerasim Hovhannisyan, CEO of EasyDMARC, discusses the complexities and challenges of implementing DMARC (Domain-based Message Authentication, Reporting & Conformance) in the cybersecurity landscape. He shares his personal journey, which began after experiencing a significant financial loss due to an email phishing attack. This incident prompted him…
  continue reading
 
The discussion centers around the intersection of artificial intelligence (AI), cybersecurity, and monetization strategies, emphasizing the dual challenges of protecting data and AI models while also effectively pricing these solutions. Experts Bryant Tow and James D. Wilton explore the urgent risks posed by AI, including threats to company data an…
  continue reading
 
In this episode, we take an in-depth look at the newly discovered CVE-2025-4664 vulnerability in Google Chrome’s Loader component. This high-severity security flaw is affecting not only Chrome but also other Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi. The issue lies in insufficient policy enforcement within the bro…
  continue reading
 
In this episode, we dive deep into the recent wave of cyberattacks plaguing major UK retailers such as Marks & Spencer, Co-op, and Harrods, with a special focus on the threat group behind them: Scattered Spider (also known as UNC3944, Muddled Libra, and several other aliases). We'll explore how this loosely coordinated cybercriminal group has expan…
  continue reading
 
Data silos are significantly hindering AI innovation, as highlighted by a recent report from Infanti. The survey of over 1,200 IT and cybersecurity professionals revealed that more than half of the respondents experience isolated data within their organizations, leading to inefficiencies and slow security responses. Nearly 30% of IT professionals r…
  continue reading
 
(0:10): Microsoft Urgently Patches Zero-Day Vulnerabilities Amid Active Attacks; Users Urged to Update Immediately (2:18): Apple Unveils Matrix3D: AI Revolutionizes 3D Modeling from Minimal Images (4:17): BOE Unveils 30+ Innovations at Display Week 2025, Launches ONE Brand for Green Tech Revolution (6:31): MediaTek Unveils Dimensity 9400e: Powering…
  continue reading
 
The European Vulnerability Database (EUVD) has officially launched, providing a vital platform for monitoring critical security flaws amid challenges faced by the U.S. in cybersecurity funding and management. This initiative aims to enhance transparency and deliver essential information on vulnerabilities, addressing gaps left by the U.S. Common Vu…
  continue reading
 
In this episode, we dive into the active exploitation of two critical zero-day vulnerabilities in SAP NetWeaver—CVE-2025-31324 and CVE-2025-42999. Threat actors have been leveraging these flaws since January 2025 to gain unauthenticated access, upload malicious web shells, and ultimately achieve remote code execution by chaining an insecure deseria…
  continue reading
 
Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naaman, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines. At the center of the conversation is ClickFix—a fast-evolving social engineering technique o…
  continue reading
 
The recent ransomware attack on Marks & Spencer (M&S) is a sobering example of the evolving cyber threat landscape confronting the retail industry. In this episode, we unpack how one of the UK's most iconic retailers fell victim to a sophisticated cybercriminal group known as Scattered Spider. This group, recognized for its advanced social engineer…
  continue reading
 
In this episode, we break down Apple’s massive May 2025 security update blitz—a sweeping patch release that spanned iOS, macOS, iPadOS, tvOS, visionOS, and watchOS. The urgency? Two zero-day vulnerabilities, CVE-2025-31200 (Core Audio) and CVE-2025-31201 (Core Media), were already under active exploitation in what experts are calling “extremely sop…
  continue reading
 
(0:10): UK Government Pressured to Update Copyright Laws for AI Protection Amidst Music Industry Backlash (2:21): Spotify Unveils AI DJ Voice Commands for Personalized Music Experience (4:12): House GOP Pushes AI Regulation Bill, Sparks Debate Over Consumer Protections and Big Tech Influence (6:28): India to Design Its First 3nm Semiconductor Chips…
  continue reading
 
Benjamin (BJ) Lippert is a Managing Partner at Donovan CPAs, a full-service accounting firm dedicated to small businesses and their owners. Since joining the firm in 2015, he has been instrumental in revamping the firm’s assurance practice, fostering a culture of accountability and growth. His leadership emphasizes structure, consistency, and a peo…
  continue reading
 
Remote work is driving a significant startup boom, reshaping the IT services market. A recent study indicates that companies with higher levels of remote work during the COVID-19 pandemic have seen a notable increase in employee startups, with an estimated 11.6% of new business formations attributed to this trend. Despite major corporations reinsta…
  continue reading
 
In this episode, we unpack the groundbreaking $1.4 billion privacy settlement between Google and the state of Texas—now the largest of its kind in U.S. history. This isn't just about numbers; it's about how data privacy enforcement is shifting dramatically at the state level in the absence of federal legislation. We dive deep into the Texas Capture…
  continue reading
 
In April 2024, a sophisticated cyber espionage campaign orchestrated by the Türkiye-linked hacker group, Marbled Dust, began exploiting a previously unknown zero-day vulnerability in the Output Messenger platform—a self-hosted enterprise chat application. This vulnerability (CVE-2025-27920) resides in the Output Messenger Server Manager and allows …
  continue reading
 
In this episode, we dissect CVE-2025-47729, a critical vulnerability in TeleMessage, a message archiving app recently thrust into the spotlight due to its use by former National Security Advisor Mike Waltz. Following Waltz’s controversial tenure—marked by the "Signalgate" leak and the subsequent appearance of TeleMessage on his phone—researchers un…
  continue reading
 
(0:10): Saudi Arabia Launches AI Company Humain to Rival US and China, Targets Global AI Leadership (2:10): Google Launches AI Futures Fund: A Boost for Startups or Strategic Ecosystem Expansion? (4:12): Fortnite Poised for iOS Comeback Amidst Epic Games and Apple Antitrust Battle (6:19): NHTSA Probes Tesla's Self-Driving Tech Amid Stock Surge and …
  continue reading
 
The recent U.S.-China tariff truce has led to a significant surge in global markets, with the U.S. reducing tariffs on Chinese goods from 145% to 30% and China lowering its tariffs on American imports from 125% to 10%. While this agreement has provided short-term relief, it has also triggered caution among Chief Information Officers (CIOs), who are…
  continue reading
 
A new supply chain attack has emerged—this time targeting macOS users of the Cursor AI code editor through rogue npm packages. In this episode, we break down how threat actors published malicious modules—sw-cur, sw-cur1, and aiide-cur—promising cheap access to Cursor's AI features. Once installed, these packages function as backdoors, stealing cred…
  continue reading
 
(0:10): Amazon Unveils 'Vulcan' Robots to Boost Warehouse Efficiency, Emphasizes Human Collaboration and Retraining (2:25): Apple Shifts iPhone Production to India: Tata and Foxconn Lead Expansion (4:21): Autonomous Vehicle Revolution: Uber, Pony.ai, and WeRide Expand Global Reach with Advanced Tech Partnerships (6:59): Samsung Galaxy S25 Edge to D…
  continue reading
 
In this episode, we break down the February 2025 data breach that hit Valsoft Corporation, operating under the name AllTrust, through its subsidiary Aspire USA. Over 160,000 individuals are potentially impacted, with exposed data including Social Security numbers, driver’s license information, and financial account details. We explore how the breac…
  continue reading
 
In this episode, we break down the recent compromise of the rand-user-agent NPM package—an attack that quietly turned a once-trusted JavaScript library into a delivery mechanism for a Remote Access Trojan (RAT). The attacker exploited the package’s deprecated but still-popular status, publishing malicious versions that never appeared in the GitHub …
  continue reading
 
Mousa Hamad, an expert in procurement and vendor management, shares insights from his extensive career in IT operations and business transformation. He emphasizes the importance of being customer-oriented and empathetic, drawing from his experiences on the front lines of IT. Hamad recounts a significant project where he tackled SaaS cost management…
  continue reading
 
Srinivas Krishnaswamy, author of "Inbound Marketing in the Age of GPTs," discusses the transformative impact of AI on customer search behaviors and marketing strategies for Managed Service Providers (MSPs). He emphasizes that traditional methods, particularly reliance on Google for information discovery, are evolving. With the rise of generative AI…
  continue reading
 
Ransomware attacks have surged dramatically, particularly affecting small and mid-sized businesses (SMBs), which now experience ransomware in 88% of breaches. According to Verizon's 2025 data breach investigations report, ransomware was detected in 44% of over 12,000 data breaches, marking a 37% increase from the previous year. While the number of …
  continue reading
 
(0:10): Apple's iOS 18.5 and iPadOS 18.5 Bring Battery Boosts, Pride Themes, and Expanded Satellite Messaging (2:09): Court Clears Microsoft-Activision Merger, Rejects FTC's Appeal Against $69 Billion Deal (4:00): Samsung to Revolutionize AR Market with LEDoS-Powered Smart Glasses by 2027 (6:17): Imagination Technologies Unveils E-Series GPUs: A Ga…
  continue reading
 
Top-performing IT solution providers are experiencing record profitability, achieving over 19% adjusted profit margins for the fifth consecutive year, despite a slowdown in revenue growth. The latest report from Service Leadership indicates that while managed service providers (MSPs) saw revenue growth of only 7.1% in 2024, their adjusted earnings …
  continue reading
 
A zero-day vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824, became the center of a global cybersecurity storm when it was exploited in the wild before Microsoft patched it on April 8, 2025. In this episode, we take a deep dive into how this elevation of privilege exploit allowed attackers to gain SYSTEM-level a…
  continue reading
 
In this episode, we dive deep into the legal, technical, and geopolitical implications of the U.S. court ruling in WhatsApp v. NSO Group—a landmark case in the global effort to hold spyware developers accountable. The conversation unpacks the court’s decision to award over $167 million in damages to WhatsApp for the unauthorized deployment of Pegas…
  continue reading
 
AI tools are generating more code than ever — but who’s reviewing it? In this episode, we spotlight CodeAnt AI, the fast-growing platform built to solve the growing code review bottleneck created by AI-assisted development. You’ll learn how CodeAnt AI: Cuts review time and post-deployment bugs by over 50% Uses a proprietary language-agnostic AST en…
  continue reading
 
(0:10): Apple's AI Ambitions Shake Google, Triggering $150 Billion Market Value Drop (2:22): Netflix Unveils New AI-Powered TV Homepage and Mobile Vertical Feed Amid Streaming Wars (4:34): Amazon Unveils Vulcan: Touch-Sensitive Robot Aims for Global Warehouse Efficiency (6:48): Apple Unveils iOS 18.5: Enhanced Performance, Parental Controls, and Ex…
  continue reading
 
AI tools are increasingly leaking sensitive data, with a recent report revealing that 68% of organizations have experienced data leaks due to employees using artificial intelligence tools. Despite a high level of confidence among security leaders—90% believe their security measures are effective—more than half reported regular malware and phishing …
  continue reading
 
A newly disclosed zero-day vulnerability, CVE-2025-3248, is being actively exploited in the wild—and it's targeting Langflow, a popular open-source framework for building AI-powered applications. In this episode, we unpack how a missing authentication check in the /api/v1/validate/code endpoint allowed remote attackers to run arbitrary code on unpa…
  continue reading
 
In this episode, we break down the active exploitation of CVE-2024-7399, a critical path traversal and arbitrary file upload vulnerability in Samsung MagicINFO 9 Server. Despite a patch released in August 2024 (version 21.1050 and later), many systems remain exposed — and threat actors are taking full advantage. We explore how attackers are exploit…
  continue reading
 
A critical zero-day vulnerability — CVE-2025-31324 — is shaking the enterprise tech world. In this episode, we dive deep into the alarming exploit targeting SAP NetWeaver Java systems, specifically the Visual Composer component, now under active attack. This vulnerability enables unauthorized file uploads, which attackers are using to deploy webshe…
  continue reading
 
(0:10): Oura Unveils AI-Driven Glucose Tracking Features, Strengthens Health Monitoring Platform (2:01): Apple Arcade Expands: New Games, Shaq in NBA 2K25, and Vision Pro Exclusives (3:50): Quantum Computing Race Heats Up: Startups and Giants Push Boundaries with Multi-Million Investments (6:01): Lightricks Unveils LTXV-13B: AI Model Revolutionizes…
  continue reading
 
The U.S. job market shows resilience with the addition of 177,000 payrolls in April, despite a slight decline in IT roles as tech professionals exit the field. The unemployment rate remains low at 4.2 percent, but the IT sector has seen significant job losses, with over 10,600 positions cut in April alone. This trend is attributed to a cautious hir…
  continue reading
 
In this episode, we break down the anatomy of some of the most critical vulnerabilities threatening enterprise systems in 2025 — and the real-world attacks already exploiting them. We explore how seemingly small issues like path traversal can escalate into full remote code execution (RCE), and how threat actors are chaining vulnerabilities to bypas…
  continue reading
 
In this episode, we dive deep into the massive data breach at Kelly Benefits, a payroll and benefits administrator that exposed the sensitive personal data of over 413,000 individuals. We break down what happened, what data was compromised, and how the breach escalated from 32,000 initially impacted people to hundreds of thousands across the countr…
  continue reading
 
In this episode, we unpack the rising tensions surrounding the Cybersecurity and Infrastructure Security Agency (CISA) as it faces proposed budget cuts, looming layoffs, and growing criticism over alleged mission overreach. While CISA continues to champion its role in defending national infrastructure and guiding cyber resilience, reports of domest…
  continue reading
 
(0:10): Global Legal Blitz Targets Tech Giants: Google, Apple, Meta Face Major Antitrust Fines and Lawsuits (2:46): Uber and WeRide to Launch Robotaxis in 15 Cities, Revolutionizing Urban Transportation (4:41): 250 CEOs Urge Mandatory AI Education in Schools to Boost U.S. Competitiveness and Close Skill Gaps (7:05): Meta Unveils LLaMA 4: A Leap For…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intelligence analyst and host of their podcast ⁠DISCARDED⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
  continue reading
 
The Global Technology Industry Association (GTIA) stands at a pivotal moment, facing a profound transformation following the sale of its certification and training division. This transition presents a unique opportunity for GTIA to redefine its mission and solidify its role as a cornerstone of the IT industry. Rather than merely adjusting to change…
  continue reading
 
Loading …
Listen to this show while you explore
Play