Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Ransomware Podcasts
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
…
continue reading
In a world where technology moves faster than strategy, how do businesses keep their data and their future secure? Smarter, Strategic Thinking brings you conversations with leaders, innovators, and partners shaping the future of IT. From ransomware protection and storage innovation to smarter infrastructure decisions, each episode explores the strategies that matter most to today’s technology leaders. Hosted by Fortuna Data — trusted partners of IBM, Lenovo, Seagate, HYCU, QNAP, and Qualstar ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
In today's episode we have a tendency to state the most recent cyberattack on JBS and check out to quantify the impact they could wear giant businesses
…
continue reading
Tech news from a uniquely Catholic perspective
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Helping you navigate the ever-changing universe of business, from headlines to the bottom line
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
I am targeting a market of IT professionals who enjoy woodworking as a hobby. Providing information around information technology topics like cyber security, cyber crime, and a few woodworking projects
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
1
Ransomware Real Life Stories Effect On People. PART 2
48:48
48:48
Play later
Play later
Lists
Like
Liked
48:48Question? Text our Studio direct. Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real…
…
continue reading
1
Inside a Real World Ransomware Incident and Recovery with Zach Lewis
48:31
48:31
Play later
Play later
Lists
Like
Liked
48:31Guest Introduction Zach Lewis serves as both CIO and CISO at the University of Health Sciences and Pharmacy in St. Louis, bringing nearly a decade of experience across engineering, systems administration, help desk leadership, and executive IT leadership. He oversees technology operations and cybersecurity for one of the oldest pharmacy institution…
…
continue reading
Usually ransomware targets large entities, but as always no one is truly safe online. This specific malware targets individual android users sideloading apps from illegitimate sources. Sources: https://pastebin.com/3J3uAVHtBy Chloe Thonus
…
continue reading
As the year winds down, cyber attackers are gearing up. Semperis’ 2025 Ransomware Holiday Risk Report reveals that over half of ransomware attacks hit during weekends or holidays, when most organisations sharply reduce monitoring and response capability. With identity systems at the heart of almost every major breach, and with global cybercrime cos…
…
continue reading
1
CYFIRMA Research- Tracking Ransomware – November 2025
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17CYFIRMA | November 2025 Ransomware Snapshot Ransomware activity shifted fast in November—Akira and INC Ransom surged; AI-driven tools accelerated attacks, and critical sectors like Manufacturing, IT, and Professional Services took the heaviest hits. North America remained the top target as threat actors expanded into virtualization platforms and ev…
…
continue reading
1
Anthrax Response to Cyber IR to Hacking Teslas: Ex-Marine & Cyber Podcaster, Wil Klusovsky, reveals 2026's Deadliest Cyber Threats
59:19
59:19
Play later
Play later
Lists
Like
Liked
59:19Ever wondered what handling deadly anthrax at the US Capitol has in common with battling ransomware in 2025? What if the next big cyber attack isn't from hackers in a basement—but from quantum computers shattering your encryption overnight? In this unmissable episode of Ransomware Rewind, cybersecurity legend Wil Klusovsky spills insider secrets th…
…
continue reading
1
Ransomware costs billions, cybercrime leads to real violence, three arrested for hacking tools
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Ransomware payments pass $4.5 billion Cybercrime networks orchestrate real-world violence Three arrested over possessing hacking tools Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip…
…
continue reading
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
…
continue reading
We return to a story on the Akira ransomware group. For 150 years Knights of Old, a U.K. logistics company, survived everything from two world wars to Brexit. Then Akira stormed the company's networks. In just a blink of an eye, everything changed. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
Cyber Daily News December 23, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Romanian Water Authority Hit by Ransomware; 1,000 Systems Across 10 Regions Compromisedhttps://thecyberexpress.com/romanian-water-authority-ransomware-attack/- U.S. CISA adds a flaw in …
…
continue reading
1
Insider Threats | When the Hacker Already Has a Badge
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Question? Text our Studio direct. 🔥The Cybercrime Junkies show debunks the myth of the typical cyber villain, focusing on how everyday situations can lead to significant `cyber security` breaches. We discuss real-world `cybercrime` scenarios involving `insider` threats and the critical need for `insider threat detection`. Understanding these risks …
…
continue reading
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, James Manico, Adam Shostack, Dustin Lehr - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Default to Deny: Why Network Security Is Shifting to "Zero Trust" ⛔ Ep. 167 ThreatLocker
49:17
49:17
Play later
Play later
Lists
Like
Liked
49:17A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker. This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting …
…
continue reading
1
Spotify music library scraped, DDoS disrupts French postal services, Fake delivery sites hit holiday shoppers
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
…
continue reading
In a small classroom in western China, children once learned to sing and count in the language of their ancestors — Uyghur. Then the doors were locked, and founder Abduweli Ayup went from teacher to enemy of the state. We return to the first episode in our series, ERASED. ERASED is a four-part investigation into how China is wiping Uyghur culture f…
…
continue reading
1
Security Is Everyone's Job and Why That Matters More Than Ever with Bryan Tomczyk
46:46
46:46
Play later
Play later
Lists
Like
Liked
46:46Guest Introduction Bryan Tomczyk serves as a Cybersecurity Engineer at GP Strategies Corporation, where he works closely with senior IT and infrastructure teams to secure systems across a large, global organization. GP Strategies operates primarily as a training and professional services company, supporting clients across multiple countries and ind…
…
continue reading
1
Department of Know: President signs defense bill, time flies at NIST, Italian ferry malware
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zer…
…
continue reading
Most threat actors come and go with the times, not lasting more than a couple years. Prince of Persia was assumed to be one such group, but it turns out they not only returned but never left in the first place. Sources: https://pastebin.com/9yJ1fxP3By Chloe Thonus
…
continue reading
1
The MOST INSANE Things That's Happened in Cyber Space This Month!
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51Question? Text our Studio direct. New Episode🔥🔥The Cybercrime Junkies show discusses contemporary `cyber security` challenges, emphasizing that older notions of threats are outdated. We dive into how direct `hacking` via `wifi` can lead to gaining `root` access, and how quick action is needed to mitigate these `exploit`s. Stay informed to protect y…
…
continue reading
Cyber Daily News December 22, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- New Flaw in Somalia’s E-Visa System Exposes Travelers’ Passport Datahttps://thecyberexpress.com/somalia-e-visa-security-flaw-data-exposure/- Infy Returns: Iran-linked hacking group show…
…
continue reading
1
President's cyber bill, Iranian APT resurfaces, Kimwold DDoS attack
7:20
7:20
Play later
Play later
Lists
Like
Liked
7:20President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
…
continue reading
1
Arrests In 0365 Scheme: Cybersecurity Today With David Shipley
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phishing platform known as Raccoon O365. U.S. prosecutors charged 54 individuals in an ATM malware scheme tied to a Venezuelan criminal…
…
continue reading
Cyber Daily News December 21, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Massive Android botnet Kimwolf infects millions, strikes with DDoShttps://securityaffairs.com/185921/malware/massive-android-botnet-kimwolf-infects-millions-strikes-with-ddos.html- ATM …
…
continue reading
1
Ransomware Real Life Stories Effect On People. PART 1
36:01
36:01
Play later
Play later
Lists
Like
Liked
36:01Question? Text our Studio direct. Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real…
…
continue reading
Cyber Daily News December 20, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Russia was behind a destructive cyber attack on a water utility in 2024, Denmark sayshttps://securityaffairs.com/185885/hacking/russia-was-behind-a-destructive-cyber-attack-on-a-water-u…
…
continue reading
1
Year-End Review: The Highs and Lows of Cybersecurity in 2025
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks,…
…
continue reading
Cyber Daily News December 19, 2025Stories mentioned in today's briefing:- China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Managerhttps://securityaffairs.com/185861/apt/china-linked-apt-uat-9686-is-targeting-cisco-secure-email-gateway-and-secure-email-and-web-manager.html- Hewlett Packard Enterprise (HPE) f…
…
continue reading
1
Windows RemoteApp problems, ferry malware arrest, Senator's open-source warning
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security …
…
continue reading
Zoom was built for speed. But in its rush to connect us, it may have left a few doors open. We return to a conversation with Dan Guido, the CEO of the cybersecurity firm Trail of Bits. He walks us through how one of Zoom's most mundane features became a hacker's best friend — and why the weakest link in crypto isn't the blockchain … it's the person…
…
continue reading
1
On the Zero Day of Christmas - Cisco Devices Under Attack
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation of a zero-day flaw in Cisco email security infrastructure by a China-linked group, a Hollywood-style attack on an Italian ferry in…
…
continue reading
Cyber Daily News December 18, 2025Stories mentioned in today's briefing:- FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Launderinghttps://thecyberexpress.com/e-note-crypto-exchange-seized/- Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerabilityhttps://thecyberexpress.com/cisco-cve-2025-20393-secure-email-cyberatt…
…
continue reading
1
The Access‑Trust Gap: Why security can’t see what work depends on
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35In our final episode of 2025, Dave Lewis, global advisory CISO for 1Password, joins Greg Otto to unpack the “access‑trust gap”: the growing mismatch between what employees (and tools like AI assistants) can access at work and what security teams can actually see, verify, and control. Dav explains how this gap shows up in everyday ways—logins that b…
…
continue reading
1
Last-Minute Tech Gifts That Won’t Feel Last-Minute
1:16:36
1:16:36
Play later
Play later
Lists
Like
Liked
1:16:36Christmas gift panic? We’ve got you covered with last-minute tech picks for all budgets—plus, a bold look at Apple’s stand on privacy and why AI-generated podcasts could ruin what makes podcasting real. With Dom Bettinelli, Fr. Joseph Sund, and Tom Grelinger. The post Last-Minute Tech Gifts That Won’t Feel Last-Minute appeared first on StarQuest Me…
…
continue reading
1
Should we worry about America’s security strategy?
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46As both the year and the current series of The Briefing Room draw to a close, Europe and much of the world have been digesting a lengthy document outlining the Trump administration’s view of foreign policy. The National Security Strategy covers much of the globe but extra special vitriol was reserved for Europe with dire warnings that the continent…
…
continue reading
1
Waze for Ships? What 600+ Vibe Coders Made in 24h
43:13
43:13
Play later
Play later
Lists
Like
Liked
43:13When we talk about Malaysian tech, we often talk about data centers and infrastructure. But are we actually building anything? Two weeks ago, over 600 developers, students, and founders answered that question at the Cursor x Anthropic Hackathon Malaysia. Kong Ka Weng and Faw Ali join us to break down how a small community meetup exploded into one o…
…
continue reading
1
FTC orders crypto to pay, New exploit of React2Shell, Ukraine fraud ring take down
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27FTC orders crypto to pay New exploit of React2Shell Ukraine-based fraud ring taken down Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's behavior: "Do this right now," or "keep it secre…
…
continue reading
1
CYFIRMA Research- SeedSnatcher: Dissecting an Android Malware Targeting Multiple Crypto Wallet Mnemonic Phrases
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Mobile Threat Alert: Crypto Mnemonic Phrase Stealer SeedSnatcher is a newly uncovered Android malware family targeting the crypto ecosystem, built to steal users’ mnemonic recovery phrases using a sophisticated DisplayOverlay attack Capabilities: Intercepts and exfiltrates seed phrases and private keys from major cryptocurrency wallets Presents dec…
…
continue reading
Think your Kindle is harmless? Think again! In this episode, Graham and special guest Danny Palmer unpack a Black Hat Europe talk revealing how a boobytrapped audiobook could exploit the Amazon eBook reader - potentially letting an attacker break into your account and seize control of your credit card. Plus a blast from 2021's "summer of ransomware…
…
continue reading