The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Ransomware Attacks Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Is the post-Cold War era over? In this brave new world, nothing is too small, or big, to be digitalised…including acts of war. Russian ransomware attacks almost doubled last year. At this very moment, cybercriminals are crippling schools, supermarkets, dentists, kindergartens, hospitals, oil pipelines - all in the name of money. Katie Puckrik wants to know who, and why. You can listen to the previous series of dot com on this same feed. Series 1 unveils the hidden army of volunteers behind t ...
…
continue reading
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
"Cyberside Chat" is your go-to source for daily cybersecurity news, providing listeners with a comprehensive rundown of the latest threats, vulnerabilities, and attacks in the digital world. Hosted by expert cybersecurity professionals, each episode of "Cyberside Chat" offers a concise and informative overview of the day's top headlines, covering everything from malware and ransomware attacks to data breaches and cyber espionage. Our team of experienced analysts and researchers keeps a close ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
Hear the latest from Kristen about what's going in the collision industry. Collision Hub can help you make new connections, better follow industry events, and catch up on industry news and job opportunities.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
1
Cybercrime Wire For Sep. 16, 2025. Ransomware Attack Hits Luxury Retailer Kering. WCYB Digital Radio
1:22
1:22
Play later
Play later
Lists
Like
Liked
1:22The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime Wire For Sep. 17, 2025. Cyberattack Strikes South Korean Card Issuer. WCYB Digital Radio.
1:33
1:33
Play later
Play later
Lists
Like
Liked
1:33The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Mastering Cyber. Watch Out For Donation Scams. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
1:37
1:37
Play later
Play later
Lists
Like
Liked
1:37Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading
1
CYFIRMA Research: Unmasking a Python Stealer- XillenStealer
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18🚨 Threat Intelligence Alert – XillenStealer 🚨 CYFIRMA research identifies XillenStealer, a Python-based open-source information stealer circulating on GitHub, built to exfiltrate: 🔹 Browser credentials & cookies 🔹 Cryptocurrency wallets 🔹 Discord, Steam, Telegram sessions 🔹 System & network data + screenshots Key insights: ⚙️ Builder GUI lowers ent…
…
continue reading
1
Cybercrime News For Sep. 17, 2025. Hackers Hit Polish Hospitals and Water Supply. WCYB Digital Radio
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading
1
Cyber programs extended, older Apple devices attacked, chatbots aid phishing scams
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16House lawmakers move to extend two key cyber programs Apple 0-day likely used in spy attacks affected older devices Reuters crafts phishing scam with AI chatbot help Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one…
…
continue reading
1
Shai-Hulud Worm - A Self Propagating Supply Chain Threat
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybersecurity Worms, Steganography Attacks, Municipal Cyber Incidents and More... In this episode of Cybersecurity Today, host Jim Love delves into multiple cybersecurity threats affecting the tech landscape. He discusses the 'Shai Hulud' worm, which has infiltrated over 187 JavaScript libraries on NPM, exploiting developer tokens for spread, inclu…
…
continue reading
1
Risky Business #807 -- Shai-Hulud npm worm wreaks old-school havoc
53:19
53:19
Play later
Play later
Lists
Like
Liked
53:19On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Shai-Hulud worm propagates via npm and steals credentials Jaguar Land Rover attack may put smaller suppliers out of business Leaked data emerges from the vendor behind the Great Firewall of China Vastaamo hacker walks free while appeal is underway Wh…
…
continue reading
1
SANS Stormcast Wednesday, September 17th, 2025: Phishing Resistants; More npm Attacks; ChatGPT MCP abuse
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
…
continue reading
1
AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet... - SWN #512
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-512
…
continue reading
1
Steve Satterwhite On Cyber. AI Won’t Replace Consultants. It Will Make Them Unstoppable.
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Satterwhite, founder and CEO at Entelligence, joins host Heather Engel to discuss how AI will make consultants "unstoppable," including how companies can get ahead of the curve, and more. An industry leader in delivering affordable, h…
…
continue reading
1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading
1
Protecting your Identity and Brand. Expert Panel Discussion.
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55New Episode with Special Guest John McLaughlin. Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identif…
…
continue reading
1
Cybercrime News For Sep. 16, 2025. Hacker Hits Smart Washers in Amsterdam School. WCYB Digital Radio
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM
1:09:41
1:09:41
Play later
Play later
Lists
Like
Liked
1:09:41What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why…
…
continue reading
1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading
Visa denials. Frozen grants. Whispers of disloyalty. It all feels strangely familiar. This week: the story of Qian Xuesen—an exiled Chinese scientist who once helped America win a war, only to be driven out in a season of suspicion. His exile isn’t just history. It’s a warning. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
1
Android security changes, CISA incentive audit, LLM usage
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Android moving to “risk-based” security updates CISA accused of Cyber Incentive mismanagement How security practitioners use LLMs Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure, customer-facing portal, giv…
…
continue reading
1
Season 1 - Episode 15 (Pedro Kertzman & Adam Goss)
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32What does it take to become a cybersecurity "unicorn"? According to Adam Goss, it's the rare combination of threat intelligence expertise with cross-domain skills that truly drives innovation in our industry. Adam takes us on his unconventional journey from aspiring penetration tester to CTI specialist and educator, revealing the critical mindset s…
…
continue reading
1
SANS Stormcast Tuesday, September 16th, 2025: Apple Updates; Rust Phishing; Samsung 0-day
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will e…
…
continue reading
1
Biggest Yet Most Anticlimactic Supply Chain Attack
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Supply chain attacks are one of the most devastating if done right, and one of the biggest in the history of NPM just occurred. However it was probably less fruitful than the attackers were hoping... Sources: https://pastebin.com/GfquiVgZBy Chloe Thonus
…
continue reading
1
Collision Coffee Talk: Tesla Is Burning and Copart Declares WAR on Bodyshops
1:18:25
1:18:25
Play later
Play later
Lists
Like
Liked
1:18:25As Fall approaches, major developments continue in the Collision Repair Industry. Tesla faces new legal challenges, hackers target original equipment manufacturers, and Copart intensifies its stance against bodyshops and repairable vehicles. Meanwhile, Michigan has issued strong guidance to insurers regarding claim handling in a recent total loss c…
…
continue reading
1
Cybercrime Magazine Update: Black Hat 2025. Takeaways From Microsoft's Threat Intel Experts.
3:33
3:33
Play later
Play later
Lists
Like
Liked
3:33Panelists at the recent Black Hat 2025 USA Conference in Las Vegas included several threat intel experts from security giant Microsoft. Cybercrime Magazine caught up with Travis Schack, principal security researcher, who previously served as CISO for the State of Colorado. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder…
…
continue reading
1
Cybercrime Wire For Sep. 15, 2025. Ransomware Attack On Uvalde Schools In Texas. WCYB Digital Radio.
1:17
1:17
Play later
Play later
Lists
Like
Liked
1:17The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Sep. 15, 2025. Salty2FA Phishing Kit Hits US & EU Firms. WCYB Digital Radio.
2:39
2:39
Play later
Play later
Lists
Like
Liked
2:39The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Advanced Persistent Threats Explained Through Mr. Robot
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised lap…
…
continue reading
1
CYFIRMA Research- Digital Frontlines: India Under Multi-Nation Hacktivist Attacks
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57India faced a wave of coordinated cyberattacks in July-August 2025 from multiple countries targeting government and public systems. Notably, a sophisticated malware campaign impersonated the Income Tax Department, tricking users into downloading a malicious file linked to a Chinese-operated server for data theft. Other attacks included data breache…
…
continue reading
1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading
1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading
1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading
1
ShinyHunters hits Vietnam, Petya-NotPetya copycat appears, CISA wants CVE
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44ShinyHunters hits Vietnam National Credit Information Center HybridPetya is a Petya/NotPetya copycat with UEFI Secure Boot bypass CISA seeks control over CVE Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure,…
…
continue reading
1
NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Cybersecurity Today: NPM Attack, Void Proxy Phishing, and Major Business Disruptions In this episode of Cybersecurity Today, host David Shipley discusses a recent massive NPM attack that, despite causing significant disruption, left hackers with minimal gains. We also cover a new, highly sophisticated phishing service called Void Proxy, which targe…
…
continue reading
1
SANS Stormcast Monday, September 15th, 2025: More Archives; Salesforce Attacks; White Cobra; BSides Augusta
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. …
…
continue reading
1
Risky Biz Soap Box: runZero shakes up vulnerability management
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17In this sponsored Soap Box edition of the Risky Business podcast, industry legend HD Moore joins the show to talk about runZero’s major push into vulnerability management. With its new Nuclei integration, runZero is now able to get a very accurate picture of what’s vulnerable in your environment, without spraying highly privileged credentials at at…
…
continue reading
1
Ep. 98 Akira hits SonicWall vulnerability and Drift/Sales force get breached
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Send us a text Ep. 98 Of the Cyber Law Revolution is live! In this episode, we discuss Akira campaign against a SonicWall vulnerability and its subsequent rampage and damage caused to companies. Also, we dive into the Drift/Salesforce breach and how companies need to beef up their incident response plans to weather large-scale upstream vendor incid…
…
continue reading
1
Biggest Cyber Insurance Mistakes To Avoid
58:02
58:02
Play later
Play later
Lists
Like
Liked
58:02Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Sp…
…
continue reading
1
The Godfather of Zero Trust - A Discussion with John Kindervag
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Inside Zero Trust: John Kindervag and the Evolution of Cybersecurity In this episode of Cybersecurity Today: Weekend Edition, host Jim Love speaks with John Kindervag, the pioneer behind the Zero Trust model of cybersecurity. With over 25 years of industry experience, John delves into how the concept originated from his early work with firewalls, a…
…
continue reading
1
Cybercrime Wire For Sep. 13-14, 2025. Weekend Update. WCYB Digital Radio.
1:01
1:01
Play later
Play later
Lists
Like
Liked
1:01The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
The Largest Supply Chain Attack in History!
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Hackers left empty-handed after massive NPM supply-chain attackBy Carl Franklin
…
continue reading